Showing 61 - 80 results of 91 for search '(((( implement making algorithm ) OR ( element means algorithm ))) OR ( level coding algorithm ))', query time: 0.09s Refine Results
  1. 61
  2. 62
  3. 63

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities by Muhammad Mazhar Rathore (17051745)

    Published 2021
    “…Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
  4. 64
  5. 65

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
    Get full text
    Get full text
    article
  6. 66

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
    Get full text
  7. 67

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…”
  8. 68
  9. 69

    A new fuzzy logic controller based IPM synchronous motor drive by Abido, M.A.

    Published 2003
    “…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …”
    Get full text
    Get full text
    article
  10. 70

    On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel by Cheded, L.

    Published 2003
    “…This theory, tested with a 1-bit quantization scheme and under very noisy environments is very well supported by our simulation results. This makes the possibility of a hardware implementation of a 1-bit FFT chip a goal worth pursuing.…”
    Get full text
    Get full text
    article
  11. 71
  12. 72

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
    Get full text
    Get full text
    Get full text
    article
  13. 73

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 74

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 75

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 76

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …”
    Get full text
    Get full text
    masterThesis
  17. 77

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 78
  19. 79
  20. 80

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”