Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
5a algorithm » rd algorithm (Expand Search), jaya algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
5a algorithm » rd algorithm (Expand Search), jaya algorithm (Expand Search), _ algorithms (Expand Search)
levels using » cells using (Expand Search)
-
181
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
182
Degree-Based Network Anonymization
Published 2020“…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
Get full text
Get full text
Get full text
masterThesis -
183
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
184
A simple approach for testing web service based applications
Published 2005“…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
185
3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA
Published 2020“…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
Get full text
masterThesis -
186
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
187
Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review
Published 2025“…Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
-
188
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
189
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
Published 2025“…We used Landsat satellite imagery and a Random Forest classification algorithm to map various land cover classes along the GCC coastline. …”
-
190
A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions
Published 2024“…Here, the conventional converter helps increase the PV source voltage from one level to another level. The proposed system is investigated by using the MATLAB/Simulink tool.…”
-
191
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …”
-
192
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …”
-
193
AUTOMATIC WEINBERGER ARRAY SYNTHESIS FROM UAHPL DESCRIPTION
Published 2020“…The system also minimizes the area required by the WA by performing row compaction. An algorithm similar to that used for channel routing is employed for compaction (Hashimoto and Stevens 1971). …”
Get full text
article -
194
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
195
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
Published 2024“…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …”
-
196
An automated temporal partitioning tool for a class of DSP applications
Published 1998Get full text
Get full text
Get full text
conferenceObject -
197
-
198
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
199
-
200
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis