Showing 221 - 240 results of 431 for search '(((( implement based algorithm ) OR ( elemental deer algorithm ))) OR ( levels using algorithm ))', query time: 0.11s Refine Results
  1. 221

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  2. 222
  3. 223

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  4. 224

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 225
  6. 226

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  7. 227
  8. 228

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 229

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  10. 230

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 231

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Despite the impact of such prediction capabilities, no work in the literature or industry has investigated the futuristic prediction of HbA1c using current blood glucose (BG) measurements. For the first time in the literature, this work proposes a novel FSL-derived algorithm for the long-term prediction of clinical HbA1c measures. …”
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236
  17. 237
  18. 238

    Developing a resilient framework for electric vehicle charging stations harnessing solar energy, standby batteries and grid integration with advanced control mechanisms by Debabrata Mazumdar (18560506)

    Published 2024
    “…To achieve optimal power management within the charging station, MATLAB/Simulink is used to implement and rigorously test the proposed system. …”
  19. 239

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
    Get full text
    article
  20. 240