Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
241
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2023“…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …”
-
242
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…Implementing multimedia applications using a real-time scheduler leads to starvation of conventional applications. …”
Get full text
article -
243
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text
-
244
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Combining these techniques provides an enhanced capability of any decision support systems (DSS. This paper discusses a modular approach toward implementing Genetic Fuzzy system termed as “Genetic Fuzzimetric Technique” (GFT). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
245
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
Get full text
article -
246
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
247
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
248
Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review
Published 2023“…In this paper, we present a taxonomy of lightweight blockchain solutions proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
249
Downlink channel estimation for IMT-DS
Published 2001“…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
Get full text
Get full text
article -
250
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…This paper addresses the problem of IoT security by investigating quantum key distribution (QKD) in beyond 5G networks. An algorithm for detecting an attacker between a transmitter and receiver is proposed, with the side effect of interrupting the QKD process while detecting the attacker. …”
-
251
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
-
252
-
253
-
254
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
255
Modeling of magnetization curves for computer-aided design
Published 1993“…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …”
Get full text
Get full text
article -
256
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
257
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016“…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
258
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
259
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
260