-
321
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
322
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
323
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
منشور في 2024"…Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…"
-
324
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
325
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
منشور في 2018"…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
احصل على النص الكامل
-
326
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
327
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
328
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …"
احصل على النص الكامل
article -
329
CEAP
منشور في 2016"…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
330
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
331
Collaborative Caching for D2D Content Sharing in 5G
منشور في 2021احصل على النص الكامل
doctoralThesis -
332
Query acceleration in distributed database systems
منشور في 2001"…Query optimization strategies aim to minimize the cost of transferring data across networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
333
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
منشور في 2022"…Two reviewers independently selected the studies, extracted data from the included studies, and assessed the risk of bias. …"
-
334
Parallel processing
منشور في 2005احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
335
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
منشور في 2017"…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
336
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
337
Video features with impact on user quality of experience
منشور في 2021"…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
338
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…The availability of solar radiation throughout the country has been mapped here using ground-based measurements and satellite data. The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …"
-
339
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
منشور في 2021"…Backward reference list checks of the included studies were also conducted. Study selection and data extraction were independently conducted by 2 reviewers. …"
-
340
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…We propose the adoption of this publicly available large dataset, which is at least one order of magnitude larger than any other dataset, to systematically compare existing methods for the detection of sleep-wake stages, thus fostering the creation of new algorithms. …"