بدائل البحث:
implementing based » implementing bundled (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
implementing based » implementing bundled (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
161
Optimizing clopidogrel dose response
منشور في 2016"…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
163
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
An efficient method for the open-shop scheduling problem using simulated annealing
منشور في 2016"…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
165
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
منشور في 2020"…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …"
احصل على النص الكامل
article -
166
Information warfare. (c2015)
منشور في 2015"…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
167
A stochastic PID controller for a class of MIMO systems
منشور في 2017"…The development of the proposed algorithm is based on minimising a stochastic performance index. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis -
169
Software tool for regression testing. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
170
A method for data path synthesis using neural networks
منشور في 2017"…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
171
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
172
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
-
174
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
175
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
176
Computation of conformal invariants
منشور في 2020"…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
177
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
178
A standalone RFID indoor positioning system using passive tags
منشور في 2011"…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
179
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
180
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis