Showing 781 - 800 results of 1,002 for search '(( element method algorithm ) OR ((( data using algorithm ) OR ( based models algorithm ))))', query time: 0.11s Refine Results
  1. 781

    Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management by Islam Eljilany (14151588)

    Published 2023
    “…From the hospital's perspective, a cost-benefit analysis was conducted based on a 1-year decision-analytic follow-up model of the economic implications of using a pharmacogenetic algorithm vs standard of care in pre-operative warfarin management in the Hamad Medical Corporation, Qatar. …”
  2. 782

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
  3. 783

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …”
  4. 784

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…The proposed algorithm is an enhanced version of the CMPN by adding the sub-band filtering algorithm effect. …”
    Get full text
    Get full text
    Get full text
    article
  5. 785

    A novel few shot learning derived architecture for long-term HbA1c prediction by Marwa Qaraqe (10135172)

    Published 2024
    “…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
  6. 786
  7. 787

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  8. 788

    Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations by Gutub, Adnan

    Published 2007
    “…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
    Get full text
    Get full text
    article
  9. 789

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 790
  11. 791

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  12. 792
  13. 793

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…In our work, we model web applications by associating features or web pages with states; state transition diagrams are based on events representing state transitions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 794

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
    Get full text
    Get full text
    article
  15. 795

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…We applied the SHAP algorithm to demonstrate the importance of most dominating features that were leveraged in the model. …”
  16. 796
  17. 797
  18. 798

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
    Get full text
    article
  19. 799

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  20. 800

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article