Showing 781 - 800 results of 1,014 for search '(((( developing a algorithm ) OR ( element data algorithm ))) OR ( data using algorithm ))*', query time: 0.11s Refine Results
  1. 781

    An aspect-oriented framework for systematic security hardening of software by Mourad, Azzam

    Published 2008
    “…We realize our proposition by integrating into the GCC compiler few features described in the SHL weaving semantics and developing a demonstrative case study…”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 782

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The denoising methodology comprises a computational algorithm to identify significant features in a high-dimensional vector of observations containing white Gaussian noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 783

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 784

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 785
  6. 786
  7. 787

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…It is important to choose the right cleaning strategy (method and frequency) to maximize the electricity production and economic performance of the PV facility. An optimization algorithm was developed and tested for multiple PV panel configurations based in Dubai Water and Electricity Authority’s (DEWA) outdoor test facil ity (OTF) solar lab. …”
    Get full text
    Get full text
  8. 788

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 789

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 790

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…A model for determining an optimal shunt capacitor value at nonsinusoidal busbars combining three basic criteria maximizing the power factor, minimizing the line losses, and maximizing the transmission efficiency is developed. …”
    Get full text
    Get full text
    article
  11. 791

    An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models by K. Mukilan (22224793)

    Published 2024
    “…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …”
  12. 792
  13. 793

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  14. 794

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…A model for determining an optimal shunt capacitor value at nonsinusoidal busbars combining three basic criteria maximizing the power factor, minimizing the line losses, and maximizing the transmission efficiency is developed. …”
    Get full text
    article
  15. 795
  16. 796
  17. 797
  18. 798
  19. 799
  20. 800

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy by El-Ferik, S

    Published 2020
    “…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
    Get full text
    article