يعرض 161 - 180 نتائج من 232 نتيجة بحث عن '(( elements rd algorithm ) OR ((( data code algorithm ) OR ( based detection algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 161

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 162

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE حسب ULLAH, SAAD

    منشور في 2022
    "…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …"
    احصل على النص الكامل
  3. 163

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…"
  4. 164

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  5. 165
  6. 166
  7. 167

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 168

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 169

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 170

    Computation of conformal invariants حسب Mohamed M.S. Nasser (16931772)

    منشور في 2021
    "…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
  11. 171

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 172

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  13. 173
  14. 174

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. …"
  15. 175

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  16. 176

    Recovery of business intelligence systems حسب Haraty, Ramzi A.

    منشور في 2018
    "…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 177

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP حسب Sait, Sadiq M.

    منشور في 2020
    "…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …"
    احصل على النص الكامل
    article
  18. 178

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Our approach provides a damage assessment and recovery algorithm that is based on agents and graphs.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 179

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip حسب Sait, Sadiq M.

    منشور في 1995
    "…The hardware design and VLSI implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 180

    CNN and HEVC Video Coding Features for Static Video Summarization حسب Issa, Obada

    منشور في 2022
    "…The proposed solutions are compared with existing works based on an SIFT flow algorithm that uses CNN features. …"
    احصل على النص الكامل
    article