Showing 121 - 140 results of 233 for search '(((( implement systematic algorithm ) OR ( element g algorithm ))) OR ( level using algorithm ))', query time: 0.10s Refine Results
  1. 121

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 122
  3. 123

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
    Get full text
  4. 124

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  5. 125

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling by Makhoul, Rim

    Published 2022
    “…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 126

    A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems by Raka Jovanovic (17947838)

    Published 2021
    “…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
  7. 127

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures by Ouaiss, Iyad

    Published 2017
    “…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 128

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  9. 129

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
    Get full text
    Get full text
    Get full text
    article
  10. 130
  11. 131

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 132
  13. 133
  14. 134

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 135
  16. 136
  17. 137

    3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA by Makkawi, Mohammad

    Published 2020
    “…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
    Get full text
    masterThesis
  18. 138

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 139

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 140

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”