بدائل البحث:
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
based all » based alloys (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
new algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
all algorithm » carlo algorithm (توسيع البحث), jaya algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements new » elements _ (توسيع البحث), elementi per (توسيع البحث)
based all » based alloys (توسيع البحث)
-
161
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
162
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
-
163
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
GENETIC SCHEDULING OF TASK GRAPHS
منشور في 2020"…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. The objective function to be minimized is the 'time on completion\ of all tasks. …"
احصل على النص الكامل
article -
165
Optimizing clopidogrel dose response
منشور في 2016"…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
166
Timing influenced general-cell genetic floorplanner
منشور في 2020"…This phase is constraint graph based. The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …"
احصل على النص الكامل
article -
167
A method for data path synthesis using neural networks
منشور في 2017"…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
168
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
منشور في 2021"…The time of arrival (TOA) of defect waves to the sensor are extracted using the continuous wavelet transform (CWT) applied on all the residual signals and are subsequently used in the astroid algorithm to locate the damage as an enclosed area. …"
احصل على النص الكامل
-
169
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
170
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
احصل على النص الكامل
article -
171
-
172
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
173
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
منشور في 2007"…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
174
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
175
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
منشور في 2003"…They are based on enumerating all the possible paths (for Terminal reliability) and all the spanning trees (for ��Network reliability). …"
احصل على النص الكامل
article -
176
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
منشور في 2024"…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
-
177
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
178
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
179
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
180
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
منشور في 2015"…Twitter micro-blogging website is a hot and emerging area of research recently, users on Twitter post millions of tweets every day from all over the world, it is very difficult and challenging task to keep track of messages and filter them based on topical interest. …"
احصل على النص الكامل