بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
element » elements (توسيع البحث)
-
161
Optimizing clopidogrel dose response
منشور في 2016"…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
163
Compensation of axle-generator errors due to wheel slip and slide
منشور في 2002"…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
-
165
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…In this paper, we present two new primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
166
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
167
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
منشور في 2014"…We implement our algorithms and conduct testing to evaluate the accuracy, efficiency and security of the modified cryptographic scheme.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
169
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
170
Comparative Study of Control Strategies for Under Actuated Manipulator
منشور في 2006احصل على النص الكامل
doctoralThesis -
171
Optimal shunt compensators at nonsinusoidal busbars
منشور في 1995"…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
احصل على النص الكامل
احصل على النص الكامل
article -
172
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
منشور في 2023"…This study sought to assess the economic benefit of implementing a pharmacogenetic-guided approach in the preprocedural warfarin management. …"
-
173
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
منشور في 2020"…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
احصل على النص الكامل
article -
174
-
175
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
منشور في 2021"…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …"
-
176
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
منشور في 2013احصل على النص الكامل
doctoralThesis -
177
Computation of conformal invariants
منشور في 2021"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
-
178
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2008"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article -
179
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2007"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article -
180
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
منشور في 2008"…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…"
احصل على النص الكامل
article