Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
121
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
122
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis -
123
Fracture and stability of strain-softening materials and structures
Published 1990“…As examples, specimens with two interacting crack tips are analyzed numerically. …”
Get full text
Get full text
Get full text
masterThesis -
124
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
-
125
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
126
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…<h3>Motivation</h3><p dir="ltr">Systems biology faces two key challenges when dealing with large amounts of disparate data produced by different experiments: the integration of results across different experiments, and the extraction of meaningful information from the data produced by these experiments. …”
-
127
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
128
Optimizing clopidogrel dose response
Published 2016“…A clinical-pharmacogenetic algorithm was developed based on whether clopidogrel shows 1) expected effect as per indication, 2) little or no effect, or 3) clinical features that patients experience and fit with clopidogrel adverse drug reactions. …”
Get full text
Get full text
Get full text
Get full text
article -
129
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
130
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
131
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
132
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …”
-
133
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
134
Modelling of pollutant transport in compound open channels
Published 1998“…This is examined through developing a 2-D finite difference mathematical model, (CHAT: Compound-channel Hydraulics And Transport), to solve the flow and transport equations for open channels having compound cross-sections. …”
Get full text
Get full text
masterThesis -
135
-
136
Iterative heuristics for multiobjective VLSI standard cellplacement
Published 2001“…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. A series of experiments is performed to study the effect of important algorithmic parameters of GA and TS. …”
Get full text
Get full text
article -
137
Regression Testing of Database Applications
Published 2002“…We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
Get full text
Get full text
Get full text
article -
138
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
139
Central schemes for ideal magnetohydrodynamics
Published 2007“…These methods alternate between two staggered grids, thus leading to Riemann solver‐free algorithms with relatively favorable computing times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
140
Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches
Published 2018“…The PV output, soiling rates, electricity price, and cleaning costs were inputted into the algorithm and 5 different approaches were simulated: 1. …”
Get full text