Showing 181 - 200 results of 228 for search '(( elements network algorithm ) OR ((( data code algorithm ) OR ( based existing algorithm ))))*', query time: 0.11s Refine Results
  1. 181

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation by Jahed, Karim

    Published 2016
    “…The key novel characteristics of our system include seamless neighbor discovery and link quality estimation, intelligent clustering and channel allocation algorithms based on constrained minimum spanning trees, robustness against device mobility, and device centric operation with no changes to existing wireless systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 182

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  3. 183

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…Then, we propose an impact analysis technique that is based on dependencies that exist among the components of database applications. …”
    Get full text
    Get full text
    Get full text
    article
  4. 184

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  5. 185

    Automated systems for diagnosis of dysgraphia in children: a survey and novel framework by Jayakanth Kunhoth (14158908)

    Published 2024
    “…Apart from that, this article discusses some of the non-artificial intelligence-based automated systems. Furthermore, this article discusses the drawbacks of existing systems and proposes a novel framework for dysgraphia diagnosis and assistance evaluation.…”
  6. 186
  7. 187

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT by Sait, Sadiq M.

    Published 2006
    “…SE is hybridized with force directed algorithm to speed-up the search. The proposed schemes are compared with previously presented SE based heuristics. …”
    Get full text
    article
  8. 188

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…The first solution is proposed based on integrating the existing surveillance camera systems with the recommended “Banking Payment Context- Account Based Ticketing System” to offer face recognition access entry to the passenger inside metro station. …”
    Get full text
  9. 189

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
  10. 190
  11. 191

    Design of a vibration absorber for harmonically forced damped systems by Issa, Jimmy

    Published 2013
    “…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 192

    A modified optimal design of a vibration absorber for ground motion isolation by Issa, Jimmy S.

    Published 2014
    “…This approximate analytical solution is validated through comparison with the exact optimal parameters which were calculated numerically using two different numerical optimization methods. The first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 193

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …”
    Get full text
  14. 194
  15. 195

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 196

    A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems by El Khoury, Elie

    Published 2022
    “…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 197

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 198

    Predicting Android Malware Using Evolution Networks by Chahine, Joy

    Published 2025
    “…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 199

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  20. 200

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject