يعرض 201 - 220 نتائج من 609 نتيجة بحث عن '(( elements could algorithm ) OR ((( data processing algorithm ) OR ( designed using algorithm ))))', وقت الاستعلام: 0.17s تنقيح النتائج
  1. 201

    Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography حسب Muhammad Ali Akbar (16875915)

    منشور في 2024
    "…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …"
  2. 202

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
  3. 203

    Humanizing AI in medical training: ethical framework for responsible design حسب Mohammed Tahri Sqalli (18420840)

    منشور في 2023
    "…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …"
  4. 204
  5. 205
  6. 206
  7. 207

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 208
  9. 209
  10. 210

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The byte-wise CRC algorithm is translated to hardware and pressed in APHL (VLSI design automation language). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 211
  12. 212
  13. 213

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  14. 214

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks حسب Najam Us Sahar Riyaz (22927843)

    منشور في 2025
    "…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
  15. 215
  16. 216

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  17. 217

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  18. 218
  19. 219
  20. 220

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. …"
    احصل على النص الكامل
    article