Showing 361 - 380 results of 418 for search '(((( implementing a algorithm ) OR ( elements rd algorithm ))) OR ( level coding algorithm ))', query time: 0.11s Refine Results
  1. 361
  2. 362

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  3. 363

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  4. 364
  5. 365

    Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system by Ali Farhat (1461478)

    Published 2018
    “…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …”
  6. 366
  7. 367

    Combinatorial method for bandwidth selection in wind speed kernel density estimation by El Dakkak, Omar

    Published 2019
    “…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …”
    Get full text
  8. 368

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  9. 369

    Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units by ElKassar, AbdulNasser

    Published 2014
    “…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…”
    Get full text
    Get full text
    Get full text
    article
  10. 370
  11. 371

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 372

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …”
  13. 373

    Four quadrant robust quick response optimally efficient inverterfed induction motor drive by Islam, S.M.

    Published 1989
    “…The control algorithms developed are readily implementable with present-day microprocessors…”
    Get full text
    Get full text
    article
  14. 374

    After generative AI : preparing faculty to transform education, learning, and pedagogy by Hardey, Mariann

    Published 2025
    “…In a landscape where technological advancements are disrupting and reshaping the educational paradigm, After Generative AI serves as a comprehensive guide to navigate the complexities and opportunities presented by Generative AI (GAI) and guide readers through strategies that must be implemented for a successful journey with GAI. …”
    Get full text
    Get full text
    Get full text
    Get full text
    bookPart
  15. 375

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…To validate our approach, we have implemented a prototype computing multimedia predicates implications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 376

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  17. 377

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
    Get full text
    Get full text
    Get full text
    article
  18. 378

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation by Getahun, Fekade

    Published 2007
    “…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 379
  20. 380

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
    Get full text