Showing 161 - 180 results of 276 for search '(((( implementing based algorithm ) OR ( element jaya algorithm ))) OR ( level coding algorithm ))', query time: 0.10s Refine Results
  1. 161
  2. 162

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  3. 163

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  4. 164

    A standalone RFID indoor positioning system using passive tags by Saab, Samer S.

    Published 2011
    “…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
    Get full text
    Get full text
    Get full text
    article
  5. 165

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  6. 166
  7. 167

    An aspect-oriented framework for systematic security hardening of software by Mourad, Azzam

    Published 2008
    “…We also explore the viability of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 168

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  9. 169

    Supervised term-category feature weighting for improved text classification by Attieh, Joseph

    Published 2022
    “…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 170

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  11. 171

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…Qualitative data was gathered from information found in relatively similar studies and from a real estate company in Dubai that allowed this study to be conducted on its databases with the help of its management and staff through interview, discussions, and direct implementations of the tools for testing. The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
    Get full text
  12. 172

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 173

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
  14. 174

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... by Mohamed Elsayed Saad Aboudonya (18466385)

    Published 2024
    “…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
  15. 175

    Decomposition method for solving a nonlinear business cycle model by Dibeh, Ghassan

    Published 2003
    “…A numerical algorithm based on a decomposition scheme is implemented for the approximate solution of the model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 176

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …”
    Get full text
  17. 177

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 178

    Efficient unified Montgomery inversion with multi-bit shifting by Savas, Erkay

    Published 2005
    “…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
    Get full text
    Get full text
    article
  19. 179

    Toward automatic motivator selection for autism behavior intervention therapy by Siyam, Nur

    Published 2022
    “…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
    Get full text
    Get full text
  20. 180

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…<p dir="ltr">The transient power grid stability is greatly affected by the unpredictability of inverter-based resources of today's interconnected power grids. …”