Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
uce algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements uce » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
uce algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements uce » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
101
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
102
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …”
Get full text
article -
103
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …”
-
104
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
105
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
106
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …”
-
107
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
108
-
109
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
110
-
111
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
112
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
113
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
114
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
-
115
-
116
-
117
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…”
Get full text
masterThesis -
118
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
119
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
120
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”