Search alternatives:
implement research » implementation research (Expand Search)
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
implement research » implementation research (Expand Search)
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
-
181
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
182
-
183
Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids
Published 2024“…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …”
-
184
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
185
Uplink channel estimation for IMT-DS system
Published 2001“…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…”
Get full text
Get full text
article -
186
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
187
Query acceleration in distributed database systems
Published 2001“…Programs were designed to implement both the original and the enhanced algorithms. …”
Get full text
Get full text
Get full text
article -
188
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
189
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
190
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
191
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
Get full text
Get full text
Get full text
masterThesis -
192
Multigrid solvers in reconfigurable hardware
Published 2008Get full text
Get full text
Get full text
Get full text
article -
193
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
Published 2021“…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
-
194
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
195
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
196
-
197
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
198
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
199
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
Published 2021“…Moreover, research focusing on how to best provide clinicians with support to understand, adapt, and implement this technology in their practice is also necessary.…”
-
200