Showing 1 - 20 results of 149 for search '(( elements _ algorithms ) OR ((( data code algorithm ) OR ( data injection algorithm ))))', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
    Get full text
    article
  4. 4
  5. 5

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 6
  7. 7
  8. 8
  9. 9

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
  10. 10

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    Subjects: “…Nature-inspired optimization algorithms…”
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The authors report on the design of a digital feedback control system to provide null steering by controlling the array element positions automatically. The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
    Get full text
    Get full text
    article
  16. 16

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
  17. 17
  18. 18
  19. 19

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
  20. 20