Showing 261 - 280 results of 447 for search '(((( implement ii algorithm ) OR ( element data algorithm ))) OR ( levels using algorithm ))', query time: 0.12s Refine Results
  1. 261

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
    Get full text
    Get full text
    Get full text
    article
  2. 262
  3. 263
  4. 264
  5. 265

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 266

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
    Get full text
  7. 267
  8. 268

    Uplink channel estimation for IMT-DS system by Sheikh, A.U.H.

    Published 2001
    “…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…”
    Get full text
    Get full text
    article
  9. 269

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 270

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  11. 271

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units by ElKassar, AbdulNasser

    Published 2014
    “…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
    Get full text
    Get full text
    Get full text
    article
  12. 272
  13. 273

    Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements by Katicha, Samer W.

    Published 2016
    “…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 274

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 275

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  16. 276

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
    Get full text
    Get full text
    article
  17. 277

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 278

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam Eljilany (14151588)

    Published 2023
    “…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …”
  19. 279

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
    Get full text
    article
  20. 280