يعرض 141 - 160 نتائج من 261 نتيجة بحث عن '(((( implement would algorithm ) OR ( elements method algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 141

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…"
  2. 142

    Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids حسب Ehsan Akbari (10803914)

    منشور في 2024
    "…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …"
  3. 143

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Then, the algorithm was used to process the five experimental datasets. …"
    احصل على النص الكامل
    article
  4. 144
  5. 145

    Uplink channel estimation for IMT-DS system حسب Sheikh, A.U.H.

    منشور في 2001
    "…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 146

    Deep Reinforcement Learning for Resource Constrained HLS Scheduling حسب Makhoul, Rim

    منشور في 2022
    "…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  7. 147

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 148

    A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems حسب Raka Jovanovic (17947838)

    منشور في 2021
    "…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …"
  9. 149

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 150

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  11. 151

    Regression Testing of Database Applications حسب Haraty, Ramzi A.

    منشور في 2002
    "…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 152
  13. 153

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  14. 154

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 155
  16. 156
  17. 157
  18. 158

    Degree-Based Network Anonymization حسب Halawi, Ola

    منشور في 2020
    "…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 159
  20. 160