Showing 281 - 300 results of 753 for search '(( elements mean algorithm ) OR ((( data code algorithm ) OR ( based i algorithm ))))', query time: 0.15s Refine Results
  1. 281
  2. 282

    A cluster-based model for QoS-OLSR protocol by Otrok, Hadi

    Published 2017
    “…Therefore, we propose a novel clustering algorithm and a relay node selection based on different combinations of metrics, such as connectivity, residual energy, and bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 283
  4. 284
  5. 285
  6. 286
  7. 287
  8. 288
  9. 289

    Deadline-based connection setup in wavelength-routed WDM networks by Fawaz, Wissam

    Published 2010
    “…The proposed approach utilizes the Earliest Deadline First (EDF) queueing algorithm to achieve deadline-based connection setup management with the deadline being the setup time requirement of an optical connection. …”
    Get full text
    Get full text
    Get full text
    article
  10. 290

    DRL-Based IRS-Assisted Secure Visible Light Communications by Danya A. Saifaldeen (19498705)

    Published 2022
    “…The DDPG-based algorithm provides an optimized solution that can adapt to the large size of design parameters and act fast to the channel variations due to users’ mobility. …”
  11. 291
  12. 292
  13. 293

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …”
  14. 294
  15. 295
  16. 296

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 297
  18. 298

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  19. 299

    An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems by Abdel-Salam, Mahmoud

    Published 2024
    “…To assess the efficacy of the I-GKSO, it has been subjected to comparisons with multiple different algorithms. …”
    Get full text
  20. 300

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”