Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
i algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
based i » based _ (Expand Search), based iot (Expand Search)
search » research (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
i algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
based i » based _ (Expand Search), based iot (Expand Search)
search » research (Expand Search)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
2
-
3
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
4
-
5
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
6
-
7
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
8
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
Get full text
article -
9
-
10
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article -
11
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
12
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
13
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. …”
-
14
Web Based Online Hybrid Teaching Method of Network Music Course
Published 2022“…In the context of big data, the lengthy personalized screening process of users has become one of the problems to be solved. Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
Get full text
-
15
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
16
-
17
-
18
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…Therefore, a simplified decoding algorithm is proposed. It is based on symbol-by-symbol detection of the Q/I components in the I/Q decoders. …”
Get full text
Get full text
article -
20
An RSS Based Localization Algorithm in Cellular Networks
Published 2011Get full text
Get full text
Get full text
article