Search alternatives:
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
iii algorithm » rd algorithm (Expand Search)
based iii » basel iii (Expand Search), based iot (Expand Search)
element » elements (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
iii algorithm » rd algorithm (Expand Search)
based iii » basel iii (Expand Search), based iot (Expand Search)
element » elements (Expand Search)
-
1
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
2
-
3
Three-phase approach for curriculum-based course timetabling problem. (c2012)
Published 2012Get full text
Get full text
masterThesis -
4
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
5
-
6
Three-phase simulated annealing algorithms for exam scheduling
Published 2003“…Hence, we refer to our solution methods as 3-phase simulated annealing (3PSA). We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
-
8
-
9
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…”
Get full text
Get full text
article -
11
-
12
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…We study three methods designed to improve point-based value iteration algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
15
A three-stage hybrid heuristic algorithm for the capacitated vehicle routing problem. (c2016)
Published 2016“…We consider heuristic methods that are based on two-phase algorithms. Each such algorithm starts by clustering the underlining network before proceeding into the route construction phase. …”
Get full text
Get full text
Get full text
masterThesis -
16
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
17
RRT and Octomap based 3D environment exploration and mapping
Published 2020Get full text
doctoralThesis -
18
FarmTech: Regulating the use of digital technologies in the agricultural sector
Published 2023“…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
-
19
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
Published 2005“…The 3G cellular mobile systems which are based on WCDMA technology are expected to be interference limited. …”
Get full text
Get full text
article -
20
A comparative study of ElGamal based digital signature algorithms
Published 2006Get full text
Get full text
Get full text
conferenceObject