يعرض 61 - 74 نتائج من 74 نتيجة بحث عن '(( elements means algorithm ) OR ((( data code algorithm ) OR ( based encryption algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 61

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 62

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  3. 63

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  4. 64

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  5. 65

    Secure and Anonymous Communications Over Delay Tolerant Networks حسب Spiridon Bakiras (16896408)

    منشور في 2020
    "…We propose two different approaches for encrypting the exchanged messages. The first one is based solely on public key cryptosystems and is, thus, suitable for short, SMS-style messaging. …"
  6. 66
  7. 67

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 68
  9. 69

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 70

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …"
    احصل على النص الكامل
    article
  11. 71

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance حسب Amr Zeedan (17983750)

    منشور في 2023
    "…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …"
  12. 72

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  13. 73

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability حسب Farah R. Zahir (18892108)

    منشور في 2017
    "…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…"
  14. 74

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …"