-
61
-
62
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
Published 2013“…In the proposed approach, mobiles are grouped into collaborative clusters using a low-complexity clustering algorithm. In each cluster, collaboration is implemented by having a cluster head send the content to other cluster members using a short-range wireless communications technology. …”
Get full text
Get full text
Get full text
article -
63
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
Published 2023“…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …”
-
64
-
65
-
66
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…The high growth of the automotive industry reveals the very bright future of this technology and its high penetration effects on the human society. …”
Get full text
Get full text
Get full text
article -
67
-
68
Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing
Published 2024“…We evaluate the proposed algorithm against state-of-the-art approaches using benchmark task scheduling problems in cloud environments. …”
Get full text
-
69
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…During the past era, Information Technology made a revolution in R&D. No double internet becomes an essential backbone of all sciences and research nowadays. …”
Get full text
-
70
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
Get full text
Get full text
masterThesis -
71
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…<p dir="ltr">The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications. …”
-
72
De-Linkability
Published 2013Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
-
74
-
75
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
Published 2005“…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …”
Get full text
Get full text
article -
76
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…This novel algorithm leverages the use of localized information for its operation. …”
Get full text
article -
77
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
Published 2001Get full text
Get full text
Get full text
conferenceObject -
78
A pragmatic approach for testing robustness on real-time component based systems
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
79
Automatic Modulation Recognition Based on the Optimized Linear Combination of Higher-Order Cumulants
Published 2022“…<p dir="ltr">Automatic modulation recognition (AMR) is used in various domains—from general-purpose communication to many military applications—thanks to the growing popularity of the Internet of Things (IoT) and related communication technologies. …”
-
80
Habitat in flames: How climate change will affect fire risk across koala forests
Published 2023“…</p><p><br></p><h3>Method:</h3><p dir="ltr">The Decision Tree machine learning algorithm was applied to generate a fire susceptibility index (a measure of the potential for a given area or region to experience wildfires) using a dataset of conditioning factors, namely: altitude, aspect, rainfall, distance from rivers, distance from roads, forest type, geology, koala presence and future dietary sources, land use-land cover (LULC), normalized difference vegetation index (NDVI), slope, soil, temperature, and wind speed.…”