Showing 161 - 180 results of 301 for search '(((( implement ii algorithm ) OR ( element method algorithm ))) OR ( neural coding algorithm ))', query time: 0.10s Refine Results
  1. 161

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 162
  3. 163

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
    Get full text
    Get full text
    Get full text
    article
  4. 164
  5. 165

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 166

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  7. 167

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units by ElKassar, AbdulNasser

    Published 2014
    “…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
    Get full text
    Get full text
    Get full text
    article
  8. 168
  9. 169

    Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers by Tarhini, Abbas

    Published 2020
    “…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 170
  11. 171

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
    Get full text
    Get full text
    article
  12. 172

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam Eljilany (14151588)

    Published 2023
    “…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …”
  13. 173

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
    Get full text
    article
  14. 174
  15. 175

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
  16. 176
  17. 177

    Computation of conformal invariants by Mohamed M.S. Nasser (16931772)

    Published 2021
    “…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
  18. 178

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2008
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article
  19. 179

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2007
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article
  20. 180

    Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning by Siddiqi, Umair F.

    Published 2008
    “…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
    Get full text
    article