Showing 361 - 380 results of 421 for search '(((( implementing a algorithm ) OR ( elements per algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 361

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  2. 362
  3. 363

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 364
  5. 365

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  6. 366

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  7. 367
  8. 368

    Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system by Ali Farhat (1461478)

    Published 2018
    “…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …”
  9. 369
  10. 370

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …”
    Get full text
  11. 371

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  12. 372

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units by ElKassar, AbdulNasser

    Published 2014
    “…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
    Get full text
    Get full text
    Get full text
    article
  13. 373
  14. 374

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 375

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …”
  16. 376

    Four quadrant robust quick response optimally efficient inverterfed induction motor drive by Islam, S.M.

    Published 1989
    “…The control algorithms developed are readily implementable with present-day microprocessors…”
    Get full text
    Get full text
    article
  17. 377

    After generative AI : preparing faculty to transform education, learning, and pedagogy by Hardey, Mariann

    Published 2025
    “…In a landscape where technological advancements are disrupting and reshaping the educational paradigm, After Generative AI serves as a comprehensive guide to navigate the complexities and opportunities presented by Generative AI (GAI) and guide readers through strategies that must be implemented for a successful journey with GAI. …”
    Get full text
    Get full text
    Get full text
    Get full text
    bookPart
  18. 378

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…To validate our approach, we have implemented a prototype computing multimedia predicates implications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 379

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  20. 380

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
    Get full text
    Get full text
    Get full text
    article