Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
161
Optimizing clopidogrel dose response
Published 2016“…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
Get full text
Get full text
Get full text
Get full text
article -
162
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
163
Compensation of axle-generator errors due to wheel slip and slide
Published 2002“…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
Get full text
Get full text
Get full text
article -
164
-
165
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
166
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
167
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
Published 2014“…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
Get full text
Get full text
Get full text
article -
168
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
169
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
Published 2020“…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
170
Comparative Study of Control Strategies for Under Actuated Manipulator
Published 2006Get full text
doctoralThesis -
171
Optimal shunt compensators at nonsinusoidal busbars
Published 1995“…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
Get full text
Get full text
article -
172
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2023“…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …”
-
173
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
Published 2020“…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
Get full text
article -
174
-
175
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
-
176
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
177
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
178
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
179
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2007“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
180
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article