يعرض 1 - 16 نتائج من 16 نتيجة بحث عن 'algorithm verifying technologies', وقت الاستعلام: 0.05s تنقيح النتائج
  1. 1

    Formal synthesis of VLSI layouts from algorithmic specifications حسب Sait, Sadiq M.

    منشور في 2020
    "…These algorithms can be mathematically verified for correctness before begin subjected to the task of translation. …"
    احصل على النص الكامل
    article
  2. 2

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…<p dir="ltr">The most important and difficult challenge the digital society has recently faced is ensuring data privacy and security in cloud‐based Internet of Things (IoT) technologies. As a result, many researchers believe that the blockchain's Distributed Ledger Technology (DLT) is a good choice for various clever applications. …"
  3. 3

    A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I حسب Khasawneh, Mohammad

    منشور في 2013
    "…It is also tested for the case when more information, beyond nearest neighbors, is made available; here, we test its operation for different numbers of step look-ahead. We verify algorithm performance by means of simulations, whereby navigational paths are calculated for different radiation fields.…"
    احصل على النص الكامل
    article
  4. 4
  5. 5

    Leveraging UAVs for Coverage in Cell-Free Vehicular Networks حسب Samir, Moataz

    منشور في 2020
    "…The success in transitioning towards smart cities relies on the availability of information and communication technologies that meet the demands of this transformation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Multi-Agent Variational Approach for Robotics: A Bio-Inspired Perspective حسب Mir, Imran

    منشور في 2023
    "…This study proposes an adaptable, bio-inspired optimization algorithm for Multi-Agent Space Exploration. The recommended approach combines a parameterized Aquila Optimizer, a bio-inspired technology, with deterministic Multi-Agent Exploration. …"
    احصل على النص الكامل
  7. 7
  8. 8

    Automatic keyword extraction from a real estate classifieds data set حسب Devassy, Dibin

    منشور في 2011
    "…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …"
    احصل على النص الكامل
  9. 9
  10. 10
  11. 11
  12. 12

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach حسب Nagendra Prabhu Selvaraj (17542041)

    منشور في 2022
    "…On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …"
  13. 13
  14. 14

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  15. 15
  16. 16