Showing 161 - 180 results of 261 for search '(( elements per algorithm ) OR ((( data code algorithm ) OR ( based all algorithm ))))', query time: 0.12s Refine Results
  1. 161

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 162

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
    Get full text
    article
  3. 163
  4. 164
  5. 165

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees by Saad, Walid

    Published 2007
    “…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 166

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  7. 167

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…They are based on enumerating all the possible paths (for Terminal reliability) and all the spanning trees (for ��Network reliability). …”
    Get full text
    article
  8. 168

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  9. 169

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
    Get full text
    Get full text
    article
  10. 170
  11. 171
  12. 172

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…Twitter micro-blogging website is a hot and emerging area of research recently, users on Twitter post millions of tweets every day from all over the world, it is very difficult and challenging task to keep track of messages and filter them based on topical interest. …”
    Get full text
  13. 173

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. …”
    Get full text
    Get full text
    Get full text
    article
  14. 174
  15. 175

    An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan by Ghulam Abbas (764241)

    Published 2024
    “…In this research, we have ameliorated the performance of the recently-introduced novel energy pattern factor method (NEPFM) via a direct search algorithm, i.e., simplex search algorithm (SSA). We designate the resulting algorithm as NEPFM-SSA as it took NEPFM’s Weibull distribution parameters as an initial guess and retuned them with the help of the simplex search algorithm to get updated Weibull distribution parameters, which ensure better fitting characteristics. …”
  16. 176

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs by Kouatli, Issam

    Published 2008
    “…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 177
  18. 178

    Efficient unified Montgomery inversion with multi-bit shifting by Savas, Erkay

    Published 2005
    “…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
    Get full text
    Get full text
    article
  19. 179

    Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation by Saqr Khalil Saeed Thabet (19517560)

    Published 2022
    “…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
  20. 180