بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث)
يعرض 21 - 40 نتائج من 42 نتيجة بحث عن 'code ((generation algorithm) OR (detection algorithm))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 21

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  2. 22
  3. 23

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE حسب ULLAH, SAAD

    منشور في 2022
    "…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …"
    احصل على النص الكامل
  4. 24

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 25
  6. 26

    BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER حسب SOOMRO, AA

    منشور في 2020
    "…To augment the throughput of the decoder for realtime decoding, the ALU word length is chosen to be equal to that of a code word and the decoding operation is accomplished in two steps, i.e. error detection and error correction. …"
    احصل على النص الكامل
    article
  7. 27

    MSLP: mRNA subcellular localization predictor based on machine learning techniques حسب Saleh Musleh (15279190)

    منشور في 2023
    "…</p><h3>Availability</h3><p dir="ltr">We have implemented a Docker container and API for end users to run their sequences on our model. Datasets, the code of API and the Docker are shared for the community in GitHub at: https://github.com/smusleh/MSLP.…"
  8. 28
  9. 29

    A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES حسب SOOMRO, AA

    منشور في 2020
    "…First, bit-slice microprocessors are used and ALU word length is chosen to be equal to that of a code word. Second, decoding operation is accomplished in two steps, namely (1) Error detection and (2) Error correction. …"
    احصل على النص الكامل
    article
  10. 30

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 31

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter حسب Syed Rahman (569240)

    منشور في 2019
    "…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
  12. 32

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 33

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  14. 34

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... حسب Mutasim Baba, Fuad

    منشور في 2023
    "…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  15. 35

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 36
  17. 37

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 38

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed method in this paper is unique in that it converts the mechanical behaviour of shell structures into images that are then used to train a machine learning algorithm. This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …"
  19. 39
  20. 40

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article