Showing 21 - 40 results of 81 for search '(( elements means algorithm ) OR ((( data code algorithm ) OR ( based force algorithm ))))', query time: 0.12s Refine Results
  1. 21

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  2. 22
  3. 23
  4. 24

    Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks by Yaacoub, Elias

    Published 2013
    “…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
    Get full text
    Get full text
    Get full text
    article
  5. 25

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  6. 26
  7. 27

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  8. 28
  9. 29

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  10. 30
  11. 31

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 32

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  13. 33
  14. 34

    Towards a Unified Arabic Government Services Chatbot Based on Ontology by Areed, Sufyan

    Published 2020
    “…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
    Get full text
  15. 35

    Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Alg... by Ali S. Alghamdi (12722891)

    Published 2023
    “…In this paper, the scheduling and management framework of an energy hub (EH) is presented with the aim of energy profit maximization in partnership with electricity, natural gas, and district heating networks (EGHNs) considering the coordinated multi-energy management based on the day-ahead market. The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
  16. 36

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. …”
  17. 37

    On-demand deployment of multiple aerial base stations for traffic offloading and network recovery by Sharafeddine, Sanaa

    Published 2019
    “…Afterwards, we propose and evaluate a more practical approach for multiple UAV deployment in a continuous 3D space, based on an unsupervised learning technique that relies on the notion of electrostatics with repulsion and attraction forces. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 38

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
  19. 39

    An Anchor-Based Localization in Underwater Wireless Sensor Networks for Industrial Oil Pipeline Monitoring by Nitin Goyal (7876730)

    Published 2022
    “…Les procédés basés sur la portée dépendent de diverses techniques comme l’angle d’arrivée (AoA), le temps d’arrivée (ToA), la différence de temps d’arrivée (TDoA) et l’indicateur de la force du signal reçu (RSSI). …”
  20. 40