بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
يعرض 461 - 480 نتائج من 634 نتيجة بحث عن '(( elements method algorithm ) OR ((( data based algorithm ) OR ( data processing algorithms ))))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 461

    Competitive learning/reflected residual vector quantization for coding angiogram images حسب Mourn, W.A.H.

    منشور في 2003
    "…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 462
  3. 463

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks حسب Artail, Hassan

    منشور في 2009
    "…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 464

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 465

    RFID localization using single reader antenna. (c2014) حسب Msheik, Hamze

    منشور في 2016
    "…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 466

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 467
  8. 468
  9. 469

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 470

    Inferential sensing techniques in industrial applications حسب Shakil,, Muhammad

    منشور في 0007
    "…Different types of dynamical neural networks are combined according to system operation and emission behavior. Real data from a boiler plant is used to develop the model. …"
    احصل على النص الكامل
    masterThesis
  11. 471

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 472

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  13. 473

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  14. 474
  15. 475

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques حسب Fares, Samar

    منشور في 2024
    "…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …"
    احصل على النص الكامل
  16. 476
  17. 477

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 478
  19. 479

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  20. 480

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees حسب Saad, Walid

    منشور في 2007
    "…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject