بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
101
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2019احصل على النص الكامل
doctoralThesis -
102
Starvation Problem in CPU Scheduling for Multimedia Systems
منشور في 2002"…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …"
احصل على النص الكامل
article -
103
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …"
-
104
UML-based regression testing for OO software
منشور في 2010"…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
105
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
106
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …"
-
107
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
منشور في 2020احصل على النص الكامل
doctoralThesis -
108
-
109
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
110
-
111
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
112
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
113
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
114
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
-
115
-
116
-
117
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…"
احصل على النص الكامل
masterThesis -
118
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
119
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
120
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"