Search alternatives:
machine algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
machine algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
-
601
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …”
Get full text
Get full text
Get full text
Get full text
article -
602
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
-
603
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…Our daily lives are getting more and more dependent on data centers and distributed storage systems in general, whether at the business or at the personal level. …”
Get full text
Get full text
Get full text
Get full text
article -
604
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
605
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
606
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
607
-
608
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
-
609
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
610
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
611
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis