Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search), rd algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
based all » based alloys (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search), rd algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
based all » based alloys (Expand Search)
-
161
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
162
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
Get full text
article -
163
A standalone RFID indoor positioning system using passive tags
Published 2011Get full text
Get full text
Get full text
article -
164
-
165
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007“…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
166
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
167
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…They are based on enumerating all the possible paths (for Terminal reliability) and all the spanning trees (for ��Network reliability). …”
Get full text
article -
168
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
-
169
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
Get full text
Get full text
article -
170
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
171
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
172
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Twitter micro-blogging website is a hot and emerging area of research recently, users on Twitter post millions of tweets every day from all over the world, it is very difficult and challenging task to keep track of messages and filter them based on topical interest. …”
Get full text
-
173
Predicting stability of classes in an object-oriented system
Published 2010“…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. …”
Get full text
Get full text
Get full text
article -
174
-
175
An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan
Published 2024“…In this research, we have ameliorated the performance of the recently-introduced novel energy pattern factor method (NEPFM) via a direct search algorithm, i.e., simplex search algorithm (SSA). We designate the resulting algorithm as NEPFM-SSA as it took NEPFM’s Weibull distribution parameters as an initial guess and retuned them with the help of the simplex search algorithm to get updated Weibull distribution parameters, which ensure better fitting characteristics. …”
-
176
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
Published 2008“…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
Get full text
Get full text
Get full text
Get full text
article -
177
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
178
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
179
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …”
-
180
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis