يعرض 101 - 120 نتائج من 122 نتيجة بحث عن '(((( implement control algorithm ) OR ( elements magic algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 101
  2. 102

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …"
    احصل على النص الكامل
    article
  3. 103

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …"
  4. 104

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 105

    Digital Image Watermarking Using Balanced Multiwavelets حسب Ghouti, L.

    منشور في 2006
    "…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
    احصل على النص الكامل
    article
  6. 106

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios حسب Hasan Abbas Al-Mohammed (16810674)

    منشور في 2021
    "…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …"
  7. 107
  8. 108
  9. 109

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 110
  11. 111

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 112

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 113

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 114

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities حسب Muhammad Mazhar Rathore (17051745)

    منشور في 2021
    "…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
  15. 115
  16. 116
  17. 117

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…"
    احصل على النص الكامل
    masterThesis
  18. 118

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 119

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 120

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"