Showing 101 - 120 results of 123 for search '(((( implement making algorithm ) OR ( element method algorithm ))) OR ( level coding algorithm ))*', query time: 0.12s Refine Results
  1. 101

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
    Get full text
    Get full text
    Get full text
    article
  2. 102

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 103

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 104

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 105

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 106

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  7. 107

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …”
    Get full text
    Get full text
    masterThesis
  8. 108

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 109
  10. 110
  11. 111

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  12. 112

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  13. 113

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 114

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 115

    After generative AI : preparing faculty to transform education, learning, and pedagogy by Hardey, Mariann

    Published 2025
    “…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    bookPart
  16. 116

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  17. 117

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  18. 118

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
  19. 119
  20. 120

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article