Search alternatives:
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
based all » based alloys (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
based all » based alloys (Expand Search)
-
141
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
142
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text
-
143
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
144
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
145
Downlink channel estimation for IMT-DS
Published 2001“…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
Get full text
Get full text
article -
146
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…This study aims to identify the technologies for user authentication and the opportunity for their transformation to mobile money transaction security despite having all the legally required data for a transaction. …”
-
147
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
148
-
149
Developing an online hate classifier for multiple social media platforms
Published 2020“…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
-
150
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis -
151
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
152
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
153
GENETIC SCHEDULING OF TASK GRAPHS
Published 2020“…The problem of assigning tasks to processing elements as a combinatorital optimization is formulated, and a heuristic based on a genetic algorithm is presented. The objective function to be minimized is the 'time on completion\ of all tasks. …”
Get full text
article -
154
Optimizing clopidogrel dose response
Published 2016“…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
Get full text
Get full text
Get full text
Get full text
article -
155
Timing influenced general-cell genetic floorplanner
Published 2020“…This phase is constraint graph based. The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …”
Get full text
article -
156
A method for data path synthesis using neural networks
Published 2017“…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
157
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…The time of arrival (TOA) of defect waves to the sensor are extracted using the continuous wavelet transform (CWT) applied on all the residual signals and are subsequently used in the astroid algorithm to locate the damage as an enclosed area. …”
Get full text
-
158
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
159
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
Get full text
article -
160
A standalone RFID indoor positioning system using passive tags
Published 2011Get full text
Get full text
Get full text
article