-
461
Competitive learning/reflected residual vector quantization for coding angiogram images
منشور في 2003"…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
462
-
463
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
منشور في 2009"…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
464
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
465
RFID localization using single reader antenna. (c2014)
منشور في 2016"…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
466
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
467
Decision-level Gait Fusion for Human Identification at a Distance
منشور في 2014احصل على النص الكامل
doctoralThesis -
468
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
469
Information Warfare
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
470
Inferential sensing techniques in industrial applications
منشور في 0007"…Different types of dynamical neural networks are combined according to system operation and emission behavior. Real data from a boiler plant is used to develop the model. …"
احصل على النص الكامل
masterThesis -
471
Using artificial bee colony to optimize software quality estimation models. (c2015)
منشور في 2016"…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
472
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
473
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
474
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
منشور في 2015احصل على النص الكامل
doctoralThesis -
475
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
منشور في 2024"…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …"
احصل على النص الكامل
-
476
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
477
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
478
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
479
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
احصل على النص الكامل
article -
480
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
منشور في 2007"…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject