يعرض 161 - 180 نتائج من 295 نتيجة بحث عن '(((( implementing based algorithm ) OR ( element data algorithms ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 161

    Optimizing clopidogrel dose response حسب Saab, Yolande B.

    منشور في 2016
    "…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 162

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 163

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 164
  5. 165

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements حسب Emara-Shabaik, Husam

    منشور في 2020
    "…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
    احصل على النص الكامل
    article
  6. 166

    Information warfare. (c2015) حسب Sai, Mohamed El

    منشور في 2015
    "…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  7. 167
  8. 168
  9. 169
  10. 170

    A method for data path synthesis using neural networks حسب Harmanani, H.

    منشور في 2017
    "…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 171
  12. 172

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 173
  14. 174

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 175
  16. 176

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 177

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  18. 178

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 179

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  20. 180