بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), jaya algorithm (توسيع البحث)
elements rd » elements _ (توسيع البحث)
implementing » implemented (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), jaya algorithm (توسيع البحث)
elements rd » elements _ (توسيع البحث)
implementing » implemented (توسيع البحث)
-
241
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …"
-
242
-
243
-
244
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
-
245
Modeling of magnetization curves for computer-aided design
منشور في 1993"…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …"
احصل على النص الكامل
احصل على النص الكامل
article -
246
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
247
An efficient method for the open-shop scheduling problem using simulated annealing
منشور في 2016"…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
248
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis -
249
-
250
Optimizing clopidogrel dose response
منشور في 2016"…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
251
Compensation of axle-generator errors due to wheel slip and slide
منشور في 2002"…In addition, a speed and acceleration observer using a Kalman filter is implemented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
252
KT2C. (c2014)
منشور في 2016"…We introduce the K-way Thermal Chip Clustering (KT2C) algorithm; a VLSI chip partitioning algorithm that is used to reduce the chip’s temperature and prevent the formation of hotspots. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
253
Information warfare. (c2015)
منشور في 2015"…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
254
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
منشور في 0000"…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
احصل على النص الكامل
احصل على النص الكامل
article -
255
Software tool for regression testing. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
256
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
-
257
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…We implement both the recently proposed “turbo greedy” algorithm of Downey et al. [8] and a new method presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
258
On end-to-end scheduling in wireless cellular networks
منشور في 2008"…To efficiently utilize the available radio resources, we propose a new resource allocation algorithm for services that require end-to-end guarantees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
259
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
260
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article