Showing 141 - 160 results of 269 for search '(((( implementing based algorithm ) OR ( element td3 algorithm ))) OR ( neural coding algorithm ))', query time: 0.10s Refine Results
  1. 141
  2. 142

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 143

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 144

    An efficient method for the open-shop scheduling problem using simulated annealing by Harmanani, Haidar M.

    Published 2016
    “…The method is based on a simulated annealing algorithm that efficiently explores the solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 145

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  6. 146

    A stochastic PID controller for a class of MIMO systems by Saab, Samer S.

    Published 2017
    “…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 147
  8. 148
  9. 149

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 150
  11. 151
  12. 152

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  13. 153

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  14. 154
  15. 155

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
  16. 156

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 157
  18. 158

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  19. 159

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  20. 160

    A standalone RFID indoor positioning system using passive tags by Saab, Samer S.

    Published 2011
    “…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
    Get full text
    Get full text
    Get full text
    article