Search alternatives:
implementing based » implementing bundled (Expand Search)
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
levels using » cells using (Expand Search)
implementing based » implementing bundled (Expand Search)
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
levels using » cells using (Expand Search)
-
241
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
242
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
243
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
244
Mechanical perturbation control of cardiac alternans
Published 2018“…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …”
Get full text
article -
245
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
246
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
247
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
248
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
249
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
250
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
251
Exploring the System Dynamics of Covid-19 in Emergency Medical Services
Published 2022“…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …”
Get full text
Get full text
Get full text
masterThesis -
252
-
253
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
254
-
255
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article -
256
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
257
A standalone RFID indoor positioning system using passive tags
Published 2011“…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
Get full text
Get full text
Get full text
article -
258
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
259
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
260
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis