Showing 241 - 260 results of 418 for search '(((( implementing a algorithm ) OR ( elements cc3d algorithm ))) OR ( level coding algorithm ))', query time: 0.10s Refine Results
  1. 241

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios by Hasan Abbas Al-Mohammed (16810674)

    Published 2021
    “…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …”
  2. 242
  3. 243
  4. 244

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  5. 245

    Modeling of magnetization curves for computer-aided design by Abuelma’atti, M.T.

    Published 1993
    “…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …”
    Get full text
    Get full text
    article
  6. 246
  7. 247

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 248
  9. 249
  10. 250

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 251

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…In addition, a speed and acceleration observer using a Kalman filter is implemented. …”
    Get full text
    Get full text
    Get full text
    article
  12. 252

    KT2C. (c2014) by Al Kawam, Ahmad

    Published 2016
    “…We introduce the K-way Thermal Chip Clustering (KT2C) algorithm; a VLSI chip partitioning algorithm that is used to reduce the chip’s temperature and prevent the formation of hotspots. …”
    Get full text
    Get full text
    masterThesis
  13. 253

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  14. 254

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
    Get full text
    Get full text
    article
  15. 255
  16. 256

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  17. 257

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…We implement both the recently proposed “turbo greedy” algorithm of Downey et al. [8] and a new method presented in this paper. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 258

    On end-to-end scheduling in wireless cellular networks by Saad, Walid

    Published 2008
    “…To efficiently utilize the available radio resources, we propose a new resource allocation algorithm for services that require end-to-end guarantees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 259

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  20. 260

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article