Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
261
Optimizing clopidogrel dose response
Published 2016“…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
Get full text
Get full text
Get full text
Get full text
article -
262
Compensation of axle-generator errors due to wheel slip and slide
Published 2002“…In addition, a speed and acceleration observer using a Kalman filter is implemented. …”
Get full text
Get full text
Get full text
article -
263
KT2C. (c2014)
Published 2016“…We introduce the K-way Thermal Chip Clustering (KT2C) algorithm; a VLSI chip partitioning algorithm that is used to reduce the chip’s temperature and prevent the formation of hotspots. …”
Get full text
Get full text
masterThesis -
264
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
265
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
266
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
267
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
268
Turbo-charging dominating set with an FPT subroutine
Published 2017“…We implement both the recently proposed “turbo greedy” algorithm of Downey et al. [8] and a new method presented in this paper. …”
Get full text
Get full text
Get full text
conferenceObject -
269
On end-to-end scheduling in wireless cellular networks
Published 2008“…To efficiently utilize the available radio resources, we propose a new resource allocation algorithm for services that require end-to-end guarantees. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
270
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
271
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
Published 2020“…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
272
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
273
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
274
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
275
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …”
Get full text
-
276
Optimal shunt compensators at nonsinusoidal busbars
Published 1995“…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented…”
Get full text
Get full text
article -
277
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
Published 2020“…However, since there are limitations on the practical values of shunt capacitor, a discretizing approach making use of standard shunt capacitor values is employed to guarantee a solution that can be implemented.…”
Get full text
article -
278
Comparative Study of Control Strategies for Under Actuated Manipulator
Published 2006Get full text
doctoralThesis -
279
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
-
280
PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT
Published 2023“…In this paper, we propose a chatbot for detecting the students feeling by using machine-learning algorithms. …”
Get full text