يعرض 161 - 180 نتائج من 279 نتيجة بحث عن '(((( implementing based algorithm ) OR ( element per algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 161

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 162
  3. 163

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 164
  5. 165

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 166

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  7. 167

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 168

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  9. 169
  10. 170

    An aspect-oriented framework for systematic security hardening of software حسب Mourad, Azzam

    منشور في 2008
    "…We also explore the viability of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 171

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring حسب Muzna Yumman (16494023)

    منشور في 2020
    "…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
  12. 172
  13. 173

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
  14. 174

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…Qualitative data was gathered from information found in relatively similar studies and from a real estate company in Dubai that allowed this study to be conducted on its databases with the help of its management and staff through interview, discussions, and direct implementations of the tools for testing. The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …"
    احصل على النص الكامل
  15. 175
  16. 176

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
  17. 177

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …"
  18. 178
  19. 179

    Developing a framework for using face recognition in transit payment transactions حسب HABEH, ORABI MOHAMMAD ABDULLAH

    منشور في 2021
    "…The proposed framework involves the hardware, software, algorithms, and system specification requirements. Further, it provides a detailed end-to-end systems integration and transaction flow between the account-based ticketing, face recognition, and banking systems. …"
    احصل على النص الكامل
  20. 180

    A Blockchain Model for Secure Communications in Internet of Vehicles حسب Mershad, Khaleel

    منشور في 2021
    "…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject