Showing 161 - 180 results of 235 for search '(((( implement low algorithm ) OR ( element content algorithm ))) OR ( levels using algorithm ))', query time: 0.10s Refine Results
  1. 161
  2. 162

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  3. 163

    A novel approach for real time flows scheduling by Fawaz, W.

    Published 2006
    “…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 164
  5. 165

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  6. 166

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 167

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 168
  9. 169

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 170

    3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA by Makkawi, Mohammad

    Published 2020
    “…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
    Get full text
    masterThesis
  11. 171

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  12. 172
  13. 173

    Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC by Abhilash Dutta Roy (22466830)

    Published 2025
    “…We used Landsat satellite imagery and a Random Forest classification algorithm to map various land cover classes along the GCC coastline. …”
  14. 174

    A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions by Chakarajamula Hussaian Basha (21633167)

    Published 2024
    “…Here, the conventional converter helps increase the PV source voltage from one level to another level. The proposed system is investigated by using the MATLAB/Simulink tool.…”
  15. 175

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …”
  16. 176

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …”
  17. 177

    AUTOMATIC WEINBERGER ARRAY SYNTHESIS FROM UAHPL DESCRIPTION by Sait, Sadiq M.

    Published 2020
    “…The system also minimizes the area required by the WA by performing row compaction. An algorithm similar to that used for channel routing is employed for compaction (Hashimoto and Stevens 1971). …”
    Get full text
    article
  18. 178

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  19. 179
  20. 180

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics by Abbas Khan (5141000)

    Published 2024
    “…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …”