-
261
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
262
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
263
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
264
Evacuation of a highly congested urban city
منشور في 2017"…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
265
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
منشور في 2018"…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
احصل على النص الكامل
-
266
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
منشور في 2020"…These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…"
احصل على النص الكامل
article -
267
Final exams scheduling for univeristies. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
268
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …"
احصل على النص الكامل
article -
269
CEAP
منشور في 2016"…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
270
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
271
Query acceleration in distributed database systems
منشور في 2001"…Query optimization strategies aim to minimize the cost of transferring data across networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
272
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
273
Parallel processing
منشور في 2005احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
274
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
منشور في 2007"…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
275
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
منشور في 2023"…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
-
276
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…We propose the adoption of this publicly available large dataset, which is at least one order of magnitude larger than any other dataset, to systematically compare existing methods for the detection of sleep-wake stages, thus fostering the creation of new algorithms. …"
-
277
Downlink channel estimation for IMT-DS
منشور في 2001"…The DL channel of an IMT-DS system consists of time-multiplexed pilot and data symbols to facilitate coherent detection. To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
278
-
279
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
280
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
منشور في 2020احصل على النص الكامل
doctoralThesis