Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
101
-
102
Mechanical perturbation control of cardiac alternans
Published 2018“…Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. To this end, a bidirectional coupling between the membrane voltage and active tension systems in a single cardiac cell is provided, and a discrete form of the proposed control algorithm, that can be incorporated in the coupled maps, is derived. …”
Get full text
article -
103
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
-
104
Map-based mobile positioning system
Published 2002“…In this paper, a mobile positioning system (MPS) is proposed based on a map-matching algorithm. Using the triangulation or a trilateration technique, the Cell of Origin, Time of Arrival, and Time Difference of Arrival, the mobile is first located within a specified area of about 500x500 squared meters in a GSM network and within a specified area of about 244x244 squared meters in an IS-95 network. …”
Get full text
Get full text
Get full text
article -
105
-
106
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
107
Nitrofurantoin-induced pulmonary toxicity
Published 2016“…Using clinical judgment and the algorithm of Naranjo, it was determined that nitrofurantoin use was the probable cause of the patient's lung injury. …”
Get full text
Get full text
Get full text
Get full text
article -
108
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
-
109
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
Get full text
Get full text
article -
110
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
111
A novel few shot learning derived architecture for long-term HbA1c prediction
Published 2024“…Finally, a K-nearest neighbor (KNN) model with majority voting is implemented for the final classification task. The proposed FSL-derived algorithm provides a prediction accuracy of 93.2%.…”
-
112
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
113
A new fuzzy logic controller based IPM synchronous motor drive
Published 2003“…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …”
Get full text
Get full text
article -
114
On the exact recovery of the FFT of noisy signals using a non-subtractively dither-quantized input channel
Published 2003“…This theory, tested with a 1-bit quantization scheme and under very noisy environments is very well supported by our simulation results. This makes the possibility of a hardware implementation of a 1-bit FFT chip a goal worth pursuing.…”
Get full text
Get full text
article -
115
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…A prototype has been implemented to evaluate the performance of our approach.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
116
-
117
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
118
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
119
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
Get full text
Get full text
Get full text
Get full text
article -
120
Finite volume central schemes for three-dimensional ideal MHD
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject