Search alternatives:
implementing control » implementing iot (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
em algorithm » deer algorithm (Expand Search)
elements em » elements _ (Expand Search), elementi per (Expand Search)
implementing control » implementing iot (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
em algorithm » deer algorithm (Expand Search)
elements em » elements _ (Expand Search), elementi per (Expand Search)
-
101
-
102
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
103
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
104
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
105
-
106
-
107
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
108
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
109
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …”
-
110
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
111
-
112
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
113
-
114
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
115
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
-
116
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
117
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
118
-
119
-
120
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Parallelism and randomization are controlled at different levels to provide more efficiency and security. …”
Get full text
masterThesis