Showing 81 - 100 results of 125 for search '(( implementing control algorithm ) OR ((( element data algorithm ) OR ( elements em algorithm ))))', query time: 0.10s Refine Results
  1. 81

    Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements by Emara-Shabaik, Husam

    Published 2020
    “…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
    Get full text
    article
  2. 82

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 83
  4. 84

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 85

    Starvation Problem in CPU Scheduling for Multimedia Systems by Salah, Khaled

    Published 2002
    “…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …”
    Get full text
    article
  6. 86
  7. 87

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
    Get full text
  8. 88

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  9. 89

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 90
  11. 91

    Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios by Hasan Abbas Al-Mohammed (16810674)

    Published 2021
    “…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …”
  12. 92

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  13. 93

    Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan by Duffuaa, S. O.

    Published 2020
    “…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
    Get full text
    article
  14. 94

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  15. 95
  16. 96

    Scheduling and allocation in high-level synthesis using stochastic techniques by Sait, Sadiq M.

    Published 2020
    “…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
    Get full text
    article
  17. 97
  18. 98

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…<p dir="ltr">Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. …”
  19. 99
  20. 100