بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
model algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
161
Anonymizing multimedia documents
منشور في 2016"…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
منشور في 2018"…To this end, an efficient algorithm for forward and backward tracking of passive particles in stochastic flow-fields is presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
163
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
Reinforcement R-learning model for time scheduling of on-demand fog placement
منشور في 2020"…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
165
Secure and Anonymous Communications Over Delay Tolerant Networks
منشور في 2020"…Through extensive simulation experiments, we show that our proposed anonymous routing protocol achieves high message delivery rates, while using modest computational resources on the mobile devices.…"
-
166
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
167
-
168
BioNetApp: An interactive visual data analysis platform for molecular expressions
منشور في 2019"…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…"
-
169
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. …"
احصل على النص الكامل
article -
170
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
171
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
172
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
173
Modelling of pollutant transport in compound open channels
منشور في 1998"…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
174
Resilience analytics: coverage and robustness in multi-modal transportation networks
منشور في 2018"…A future goal is to use this experience to make projections for a fast growing city like Doha.…"
-
175
-
176
Developing an online hate classifier for multiple social media platforms
منشور في 2020"…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
-
177
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
178
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
منشور في 2019"…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …"
-
179
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
منشور في 2021احصل على النص الكامل
doctoralThesis -
180
Condenser capacity and hyperbolic perimeterImage 1
منشور في 2021"…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article