Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
201
Optimizing clopidogrel dose response
Published 2016“…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
Get full text
Get full text
Get full text
Get full text
article -
202
Downlink channel estimation for IMT-DS
Published 2001“…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
Get full text
Get full text
article -
203
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
204
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016“…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
205
A stochastic PID controller for a class of MIMO systems
Published 2017“…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
206
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
207
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
208
COMPUTER AIDED PROGRAMMING EDUCATION (CAPE)
Published 2020“…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
Get full text
article -
209
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2022“…The benefit of the interventional algorithm was based on estimated reduction in the probabilities of clinical events and their cost, added to the avoided cost because of canceled procedures. …”
Get full text
Get full text
Get full text
article -
210
A method for data path synthesis using neural networks
Published 2017“…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
211
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
Published 2019“…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …”
Get full text
article -
212
Approximate XML structure validation technical report
Published 2014“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
article -
213
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2023“…The benefit of the interventional algorithm was based on estimated reduction in the probabilities of clinical events and their cost, added to the avoided cost because of canceled procedures. …”
-
214
-
215
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
216
-
217
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article -
218
A standalone RFID indoor positioning system using passive tags
Published 2011“…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
Get full text
Get full text
Get full text
article -
219
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
220
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …”
Get full text
Get full text
article