Showing 121 - 140 results of 221 for search '(((( elements rl algorithm ) OR ( experiments using algorithm ))) OR ( level coding algorithm ))*', query time: 0.10s Refine Results
  1. 121
  2. 122
  3. 123

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 124

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Mara'Beh (17337892)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  5. 125

    Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models by Raed Ali Ayesh Marabeh (21142247)

    Published 2025
    “…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
  6. 126
  7. 127

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 128

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…To this end, an efficient algorithm for forward and backward tracking of passive particles in stochastic flow-fields is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 129

    Reinforcement R-learning model for time scheduling of on-demand fog placement by Farhat, Peter

    Published 2020
    “…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 130

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Through extensive simulation experiments, we show that our proposed anonymous routing protocol achieves high message delivery rates, while using modest computational resources on the mobile devices.…”
  11. 131

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  12. 132
  13. 133

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 134
  15. 135

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
  16. 136

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…It is of polynomial complexity, in comparison with existing exponential algorithms. Classification experiments, conducted on large sets of real and synthetic XML documents, underline our approach effectiveness, as well as its applicability to large XML repositories and databases. © Springer-Verlag Berlin Heidelberg 2007.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 137

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 138

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  19. 139

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
    Get full text
    Get full text
    masterThesis
  20. 140

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”