Showing 161 - 180 results of 279 for search '(((( implement based algorithm ) OR ( elements custom algorithm ))) OR ( level coding algorithm ))*', query time: 0.09s Refine Results
  1. 161

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 162

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 163

    A stochastic PID controller for a class of MIMO systems by Saab, Samer S.

    Published 2017
    “…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 164
  5. 165
  6. 166

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) by Al-Sukairi, Abdallah

    Published 2020
    “…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
    Get full text
    article
  7. 167

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam, Eljilany

    Published 2022
    “…The benefit of the interventional algorithm was based on estimated reduction in the probabilities of clinical events and their cost, added to the avoided cost because of canceled procedures. …”
    Get full text
    Get full text
    Get full text
    article
  8. 168

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 169
  10. 170

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes by Wadi, Ali

    Published 2019
    “…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …”
    Get full text
    article
  11. 171

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam Eljilany (14151588)

    Published 2023
    “…The benefit of the interventional algorithm was based on estimated reduction in the probabilities of clinical events and their cost, added to the avoided cost because of canceled procedures. …”
  12. 172

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  13. 173
  14. 174

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
    Get full text
  15. 175
  16. 176

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  17. 177

    A standalone RFID indoor positioning system using passive tags by Saab, Samer S.

    Published 2011
    “…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
    Get full text
    Get full text
    Get full text
    article
  18. 178

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  19. 179
  20. 180

    Developing a framework for using face recognition in transit payment transactions by HABEH, ORABI MOHAMMAD ABDULLAH

    Published 2021
    “…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
    Get full text