Showing 1 - 20 results of 31 for search '(( implementing would algorithm ) OR ((( element rd algorithm ) OR ( neural coding algorithm ))))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2015
    “…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. Genetic Algorithm would be used to optimize the performance of the system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12
  13. 13

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…Our proposed approach would replace the necessity for a centralized system, with a decentralized approach implemented in the blockchain using distributed file storage, for which we will use the InterPlanetary File System (IPFS), which is a distributed file system. …”
  14. 14
  15. 15

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…To get a therapeutic effect and avoid adverse drug reactions, therapeutic dose of 75 mg clopidogrel, for example, should be lowered to 6 mg or increased to 215 mg in patients with different genotypes. Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 16

    Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure by Kouatli, Issam

    Published 2014
    “…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 18

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  19. 19
  20. 20

    Mobile hospitals routing for prioritized patients by Tarhini, Abbas

    Published 2017
    “…A lot of research has been conducted regarding this topic; still, up to our knowledge, none used an intelligent variable neighbourhood search approach. This paper implements and tests an intelligent variable neighbourhood search algorithm for MHRP. …”
    Get full text
    Get full text
    conferenceObject