Showing 321 - 340 results of 418 for search '(((( implementing a algorithm ) OR ( elements rd algorithm ))) OR ( level coding algorithm ))', query time: 0.11s Refine Results
  1. 321
  2. 322

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …”
  3. 323

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 324
  5. 325

    Digital Image Watermarking Using Balanced Multiwavelets by Ghouti, L.

    Published 2006
    “…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
    Get full text
    article
  6. 326
  7. 327
  8. 328
  9. 329

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…The identified covariance magnitudes are then utilized to estimate the dynamics of drug release as well as the bias term. The identified a priori knowledge is used to implement an optimal Kalman filter, which was initially tested in a simulation environment. …”
    Get full text
    article
  10. 330

    Failure recovery in wireless content distribution networks with device-to-device cooperation by Sharafeddine, Sanaa

    Published 2017
    “…Moreover, we propose a constrained version of the minimum spanning tree algorithm with bounds on the height of the tree and the maximum degree per node, in order to capture practical operational constraints for device-to-device cooperation in wireless networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 331

    An easy-to-use scalable framework for parallel recursive backtracking by Abu-Khzam, Faisal N.

    Published 2013
    “…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …”
    Get full text
    Get full text
    Get full text
    article
  12. 332

    On the disk dimension of planar graphs by Abu-khzam, Faisal

    Published 2011
    “…More significantly, we devise a direct and highly practical linear-time algorithm to decide whether an arbitrary graph has fixed disk dimension k or less. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 333

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…Cognitive radios are expected to play a major role towards meeting the exploding traffic demand over wireless systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 334

    Mobile clinics routing in response to covid-19 outbreak: an intelligent hyperheuristic approach by Danach, Kassem

    Published 2022
    “…This paper implements and tests an intelligent variable neighbourhood search algorithm for MCRP.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 335

    On scalable parallel recursive backtracking by Abu-Khzam, Faisal N.

    Published 2015
    “…Unfortunately, getting serial algorithms to run in parallel to take advantage of these computational resources remains a challenge for several application domains. …”
    Get full text
    Get full text
    Get full text
    article
  16. 336

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …”
  17. 337

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
  18. 338

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…To mitigate these risks, it is important to conduct thorough security evaluations of wallets and implement strong protective measures. In recent years, there have been several incidents involving significant losses of cryptocurrency in crypto-wallets, and in this research, a comprehensive evaluation of seed phrase and password attack methods found in the published literature was conducted, and the topic was advanced by addressing the question of whether seed phrases are hackable. …”
  19. 339

    Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms by Nemer, Rama

    Published 2009
    “…I extended an existing simulation tool to implement argumentation games and used it to run repeated game experiments using combinations of characteristic argumentation games, adapted from literature, and types of adaptive agents under different conditions.The theme used was that of a court setting whereby there is a judge listening to arguments from different agents. …”
    Get full text
  20. 340