Showing 261 - 280 results of 453 for search '(((( implement based algorithm ) OR ( experiments each algorithm ))) OR ( level using algorithm ))', query time: 0.13s Refine Results
  1. 261

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  2. 262

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  3. 263
  4. 264
  5. 265
  6. 266

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 267
  8. 268

    3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA by Makkawi, Mohammad

    Published 2020
    “…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
    Get full text
    masterThesis
  9. 269

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 270

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 271
  12. 272

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 273

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 274

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
  15. 275

    A stochastic PID controller for a class of MIMO systems by Saab, Samer S.

    Published 2017
    “…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 276
  17. 277

    A novel approach for real time flows scheduling by Fawaz, W.

    Published 2006
    “…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 278
  19. 279

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches by ALHAJERI, RASHED ABDULLA

    Published 2018
    “…The PV output, soiling rates, electricity price, and cleaning costs were inputted into the algorithm and 5 different approaches were simulated: 1. …”
    Get full text
  20. 280

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …”