Showing 341 - 360 results of 416 for search '(((( present study algorithm ) OR ( complement wold algorithm ))) OR ( level using algorithm ))', query time: 0.11s Refine Results
  1. 341

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability by Farah R. Zahir (18892108)

    Published 2017
    “…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
  2. 342
  3. 343

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…These capabilities support the various states of the typical cycle of dynamic cyber resilience, including threshold, bottom, and equilibrium states to increase CIIs robustness against cyberattacks, absorb frequent cyber disturbances that occurred, recover quickly from cyber failures, and re-establish their acceptable performance levels within appropriate timeframe. This thesis presents the novel proposed solution of dynamic cyber resilience using cyber zero-trust engineering for the first time to cope with highlighted shortcomings of the standard solutions, overcome the single hub node failure and enhance dynamic cyber resilience capabilities of interdependent CII networks against concurrent and consecutive cyberattacks to deliver their core services continuously. …”
    Get full text
  4. 344
  5. 345

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation by Said Mahfoud (17150968)

    Published 2022
    “…For that reason, this work is focused on the theoretical studies and experimental validation on dSPACE Board DS1104 of the new proposed approach based on PID speed regulation, optimized by the Ant Colony Optimization algorithm (ACO) for DTC, applied to both sides of the Doubly Fed Induction Motor (DFIM), to overcome the previous drawbacks cited at the beginning. …”
  6. 346

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…However, the exorbitant expenses associated with 7T MRI scanners hinder their broad use in research and clinical facilities. Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  7. 347

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 348

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  9. 349

    Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System by Alaa Altawallbeh (22565837)

    Published 2025
    “…We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …”
  10. 350

    Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter by Mena S. ElMenshawy (17983807)

    Published 2023
    “…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …”
  11. 351
  12. 352
  13. 353

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 354

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  15. 355

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…Wearable devices (WDs) make use of sensors historically reserved for hospital settings. …”
  16. 356

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
  17. 357

    Diagnostic and therapeutic challenges of BRASH syndrome by Fateen Ata (12217764)

    Published 2021
    “…Further studies are warranted to understand the pathophysiology and develop better and accurate management algorithms. …”
  18. 358

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 359

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  20. 360

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …”
    Get full text
    Get full text
    Get full text
    article