Showing 161 - 180 results of 420 for search '(((( implementing a algorithm ) OR ( elements fusion algorithm ))) OR ( level coding algorithm ))*', query time: 0.12s Refine Results
  1. 161

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 162

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…This implementation is modeled using VHDL in a parametrizable manner. …”
    Get full text
    masterThesis
  3. 163

    A machine learning approach for localization in cellular environments by Abdallah, Ali A.

    Published 2018
    “…The integration takes advantage of the robust clustering ability of WKNN and implements a neural network that could estimate the position within each cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 164

    Platoon Transitional Maneuver Control System: A Review by Sareh Badnava (16891374)

    Published 2021
    “…The most recent articles on platoon control maneuvers have been analyzed based on the proposed control algorithm, homogeneously or heterogeneously of platoon members, type of platoon maneuver, the aim of control problem, type of implementation, and used simulation tools. …”
  5. 165

    Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams by Eduardo Feo-Flushing (23276023)

    Published 2021
    “…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
  6. 166

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 167

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  8. 168

    Decomposition method for solving a nonlinear business cycle model by Dibeh, Ghassan

    Published 2003
    “…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 169

    Automated skills assessment in open surgery: A scoping review by Hawa Hamza (17707224)

    Published 2025
    “…We highlight the progress in automated skills assessment during open surgery with advancements in sensor technology, and AI algorithms with high prediction accuracies. Further developments in data acquisition and processing methods are essential to facilitate clinical implementation of such technologies.…”
  10. 170

    Design Feasibility Study For A 500 Gbits/s AES Cypher Decypher Engine by Bouhraoua, A.

    Published 2006
    “…A feasibility study for implementing the AES encryption algorithm in hardware achieving 500 Gbits/s is presented. …”
    Get full text
    Get full text
    article
  11. 171

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  12. 172

    The architecture of a highly reconfigurable RISC dataflow array processor by Sait, Sadiq M.

    Published 2020
    “…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. …”
    Get full text
    article
  13. 173

    A standalone RFID indoor positioning system using passive tags by Saab, Samer S.

    Published 2011
    “…The inputs of the proposed algorithm are the measurements of the backscattered signal power propagated from nearby RFID tags and a tag-path position database. …”
    Get full text
    Get full text
    Get full text
    article
  14. 174

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …”
    Get full text
  15. 175

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…This study contributes to the literature by offering practical insights into the use of AI for inclusive education and as well outlining key challenges that must be addressed in order to get effective AI implementation. The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. …”
    Get full text
  16. 176

    A decentralized load balancing approach for parallel search-tree optimization by Abu-Khzam, F.N.

    Published 2017
    “…As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 177

    A hybrid EDF/FIFO queue for efficient real time flow handling by Fawaz, W.

    Published 2006
    “…But still, EDF is complex and expensive as far as implementation is concerned. As a main contribution in this paper, we therefore propose a hybrid EDF/FIFO queue management approach, which consists of a short EDF queue completed by a FIFO queue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 178

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques by Joao Palotti (8479842)

    Published 2019
    “…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …”
  19. 179

    A method for efficient NoC test scheduling using deterministic routing by Harmanani, Haidar

    Published 2017
    “…The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 180

    Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan by Duffuaa, S. O.

    Published 2020
    “…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
    Get full text
    article