يعرض 161 - 180 نتائج من 276 نتيجة بحث عن '(( elements new algorithm ) OR ((( data code algorithm ) OR ( based all algorithm ))))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 161
  2. 162

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  3. 163

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 164

    GENETIC SCHEDULING OF TASK GRAPHS حسب Benten, M. S.

    منشور في 2020
    "…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. The objective function to be minimized is the 'time on completion\ of all tasks. …"
    احصل على النص الكامل
    article
  5. 165

    Optimizing clopidogrel dose response حسب Saab, Yolande B.

    منشور في 2016
    "…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 166

    Timing influenced general-cell genetic floorplanner حسب Sait, Sadiq M.

    منشور في 2020
    "…This phase is constraint graph based. The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …"
    احصل على النص الكامل
    article
  7. 167

    A method for data path synthesis using neural networks حسب Harmanani, H.

    منشور في 2017
    "…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 168

    LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH حسب A. Masurkar, Faeez

    منشور في 2021
    "…The time of arrival (TOA) of defect waves to the sensor are extracted using the continuous wavelet transform (CWT) applied on all the residual signals and are subsequently used in the astroid algorithm to locate the damage as an enclosed area. …"
    احصل على النص الكامل
  9. 169

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 170

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  11. 171
  12. 172
  13. 173

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees حسب Saad, Walid

    منشور في 2007
    "…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 174

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  15. 175

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability حسب Abd-El-barr, Mostafa

    منشور في 2003
    "…They are based on enumerating all the possible paths (for Terminal reliability) and all the spanning trees (for ��Network reliability). …"
    احصل على النص الكامل
    article
  16. 176

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …"
  17. 177

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 178
  19. 179
  20. 180

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai حسب Hamadeh, Moutaz Wajih

    منشور في 2015
    "…Twitter micro-blogging website is a hot and emerging area of research recently, users on Twitter post millions of tweets every day from all over the world, it is very difficult and challenging task to keep track of messages and filter them based on topical interest. …"
    احصل على النص الكامل