Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
121
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
122
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
123
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
124
Artificial Intelligence for Assessing the Correlation Between Sleep Apnoea and Comorbidities
Published 2022Get full text
doctoralThesis -
125
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
126
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The results suggest that the proposed algorithm, the optimal Kalman filter, performs better than the other two in all tests performed.…”
Get full text
article -
127
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
128
Query acceleration in distributed database systems
Published 2001“…Programs were designed to implement both the original and the enhanced algorithms. …”
Get full text
Get full text
Get full text
article -
129
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
130
-
131
Supervised term-category feature weighting for improved text classification
Published 2022“…It consists of a supervised weighting scheme defined based on a variant of the TF-ICF (Term Frequency-Inverse Category Frequency) model, embedded into three new lean classification approaches: (i) IterativeAdditive (flat), (ii) GradientDescentANN (1-layered), and (iii) FeedForwardANN (2-layered). …”
Get full text
Get full text
Get full text
Get full text
article -
132
-
133
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
134
Multigrid solvers in reconfigurable hardware
Published 2008“…Yet, most efforts fail in this respect due to many factors (time, resources) governed by software implementations. In this paper, we present a hardware implementation of the V-cycle Multigrid method for finding the solution of a 2D-Poisson equation. …”
Get full text
Get full text
Get full text
Get full text
article -
135
Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms
Published 2009“…As for the effect of the learning algorithm on the choice of strategy, the results confirm that WPL is biased toward mixed strategies while GIGA is faster in convergence to pure strategy Nash equilibria. …”
Get full text
-
136
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
-
137
Developing a resilient framework for electric vehicle charging stations harnessing solar energy, standby batteries and grid integration with advanced control mechanisms
Published 2024“…To achieve optimal power management within the charging station, MATLAB/Simulink is used to implement and rigorously test the proposed system. …”
-
138
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
139
Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection
Published 2020“…The so-called HMC-QU database will serve as the benchmark for the forthcoming relevant studies. The results over HMC-QU dataset show that the proposed approach can achieve 87.94% accuracy, 92.86% sensitivity and 87.64% precision in MI detection even though the echo quality is quite poor and the temporal resolution is low.…”
-
140
Nitrofurantoin-induced pulmonary toxicity
Published 2016“…Using clinical judgment and the algorithm of Naranjo, it was determined that nitrofurantoin use was the probable cause of the patient's lung injury. …”
Get full text
Get full text
Get full text
Get full text
article