Showing 201 - 220 results of 304 for search 'algorithm a technologies', query time: 0.07s Refine Results
  1. 201

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…Non-orthogonal multiple access (NOMA) is one of the promising access technologies to improve spectral efficiency and serve a higher number of users in different internet of things (IoT) systems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 202
  3. 203

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …”
    Get full text
    Get full text
    masterThesis
  4. 204

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …”
  5. 205

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Multiple models have been proposed and different techniques and data structures were used. Our approach provides a damage assessment and recovery algorithm that is based on agents and graphs.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 206

    Energy Internet: State of the Art and Challenges by Dina Emad (21154739)

    Published 2024
    “…</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2024.3439853" target="_blank">https://dx.doi.org/10.1109/access.2024.3439853</a></p>…”
  7. 207

    Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review by Mohamed Massaoudi (16888710)

    Published 2021
    “…In addition, this review analyzes recent automatic architecture optimization algorithms for DL-based PVPF. Next, the notable DL technologies are thoroughly described. …”
  8. 208

    Optimization of Battery Electric Bus Charging under Varying Operating Conditions by Basma, Hussein

    Published 2020
    “…Battery electric buses (BEB) are being recognized as a promising solution to replace diesel bus fleets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 209
  10. 210
  11. 211

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Thus, classification of salak based on their cultivar become a daily job for the fruit farmers. There are many techniques that can be used for fruit classification using computer vision technology. …”
    Get full text
  12. 212
  13. 213
  14. 214

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…This system consists of two subsystems that communicate wirelessly using Bluetooth low energy technology: A portable digital stethoscope subsystem, and a computer-based decision-making subsystem. …”
  15. 215

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing by Xin Li (51274)

    Published 2020
    “…Computation offloading technology provides a sustainable and low-cost solution to these problems. …”
  16. 216

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning by MEZAHEM, FATEMA HAMAD

    Published 2022
    “…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. In order to label the data that was gathered from a corpus collection for ML use, manual annotation was made. …”
    Get full text
  17. 217

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
  18. 218
  19. 219
  20. 220