بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
221
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…The proposed algorithm has been tested on three tank system pilot plant and Ain El Kebira Cement rotary kiln process. …"
-
222
Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier
منشور في 2025"…The WA-SVD leverages the slime mould algorithm (SMA) and graph theory (GT) in enhancing the overall accuracy of fault localization. …"
-
223
-
224
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …"
-
225
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
226
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
منشور في 2023"…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …"
-
227
-
228
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
229
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
230
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
231
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
منشور في 2022"…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
احصل على النص الكامل
-
232
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
233
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
234
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
-
235
Downlink channel estimation for IMT-DS
منشور في 2001"…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
احصل على النص الكامل
احصل على النص الكامل
article -
236
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
237
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
238
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
منشور في 2017احصل على النص الكامل
doctoralThesis -
239
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis -
240
Robustness evaluation of real-Time Protocols
منشور في 2006"…A test execution algorithm is also presented. Testing the SUT is divided into two phases that tests the robustness of each component and the robustness of the communication between them.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject