Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
241
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …”
-
242
-
243
-
244
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
245
Modeling of magnetization curves for computer-aided design
Published 1993“…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …”
Get full text
Get full text
article -
246
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
247
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016“…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
248
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
249
-
250
Optimizing clopidogrel dose response
Published 2016“…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
Get full text
Get full text
Get full text
Get full text
article -
251
Compensation of axle-generator errors due to wheel slip and slide
Published 2002“…In addition, a speed and acceleration observer using a Kalman filter is implemented. …”
Get full text
Get full text
Get full text
article -
252
KT2C. (c2014)
Published 2016“…We introduce the K-way Thermal Chip Clustering (KT2C) algorithm; a VLSI chip partitioning algorithm that is used to reduce the chip’s temperature and prevent the formation of hotspots. …”
Get full text
Get full text
masterThesis -
253
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
254
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
255
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
256
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
257
Turbo-charging dominating set with an FPT subroutine
Published 2017“…We implement both the recently proposed “turbo greedy” algorithm of Downey et al. [8] and a new method presented in this paper. …”
Get full text
Get full text
Get full text
conferenceObject -
258
On end-to-end scheduling in wireless cellular networks
Published 2008“…To efficiently utilize the available radio resources, we propose a new resource allocation algorithm for services that require end-to-end guarantees. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
259
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
260
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
Published 2020“…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
Get full text
Get full text
Get full text
Get full text
article