<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using histograms to detect and track objects in color video
2
Using historic test program data to improve the repair process
3
Using historical data for forecasting S-curves at construction industry
4
Using historical data processing method to optimize Energy Hub
5
Using Historical Data to Predict Application Runtimes on Backfilling Parallel Systems
6
Using Historical In-Process and Product Metrics for Early Estimation of Software Failures
7
Using Historical NASA Cost and Schedule Growth to Set Future Program and Project Reserve Guidelines
8
Using Historical Role to Speed up Subsequent Negotiations
9
Using historical software vulnerability data to forecast future vulnerabilities
10
Using history and sociology to teach engineering ethics
11
Using history information to improve design flaws detection
12
Using history of technology to promote an understanding of the impact of engineering solutions among practitioners at the university level
13
Using history to improve mobile application adaptation
14
Using HJ 1-A/B satellite imagery for near-shore sea ice monitoring in the nanpu-caofeidian area, Bohai Bay, China
15
Using HL7 CDA and CCD standards to improve communication between healthcare information systems
16
Using HLA sequence analysis and HLAMatchmaker to examine CREGs
17
Using HMAC for Error Correction over a Wireless Channel
18
Using HMM based recognizers for writer identification and verification
19
Using HMM for Intent Recognition in Cyber Security Situation Awareness
20
Using HMM to sign language video retrieval
21
Using HMM Toolkit (HTK) for recognition of arabic manuscripts characters
22
Using HMMs for Discriminating Mobile from Static Objects in a 3D Occupancy Grid
23
Using HMMs in audio-to-visual conversion
24
Using HMMS to Identify Groups in a Patient Population: A Simulation
25
Using HMT and HASH_TREE to Optimize Apriori Algorithm
26
Using Hoarding to Increase Availability in Shared File Systems
27
Using Hoare´s axiomatic semantics for checking satisfiability of ontology change operations
28
Using HOG-LBP features and MMP learning to recognize imaging signs of lung lesions
29
Using HOL To Produce Custom Verification Tools
30
Using holistic methodology to build scalable networks
31
Using home routers as proxies for energy-efficient bittorrent downloads to mobile phones
32
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining
33
Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification
34
Using Honey Bee Teamwork Strategy in Software Agents
35
Using Honey Templates to Augment Hash Based Biometric Template Protection
36
Using Honeyclients to Detect Malicious Websites
37
Using honeynets to protect large enterprise networks
38
Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks
39
Using Hopfield network for multiuser signal detection
40
Using Hopfield networks in the nominal color coding of classified images
41
Using Hopfield networks to solve traveling salesman problems based on stable state analysis technique
42
Using Hopfield neural network for economic dispatch of power systems
43
Using Hopfield neural networks to solve DEA problems
44
Using horizontal prefetching to circumvent the jump problem
45
Using HoRoCoL to control robotics Atoms
46
Using Horocol to program a society of agents or teams of robots
47
Using host criticalities for fault tolerance in mobile agent systems
48
Using host profiling to refine statistical application identification
49
Using HSPA to improve the telemedical links on a moving ambulance
50
Using HTML Tags to Improve Parallel Resources Extraction
51
Using HTML5 visualizations in software fault localization
52
Using HTML5 web interface for visualization and control system
53
Using HTTP Pipelining to Improve Progressive Download over Multiple Heterogeneous Interfaces
54
Using huge address spaces to construct cooperative systems
55
Using Human and Model Performance to Compare MRI Reconstructions
56
Using human approach paths to improve social navigation
57
Using human body gestures as inputs for gaming via depth analysis
58
Using human experts´ gaze data to evaluate image processing algorithms
59
Using human factors engineering as the basis for developing medical human-computer systems
60
Using human gestures and generic skills to instruct a mobile robot arm in a feeder filling scenario
61
Using human language technologies in aviation weather applications
62
Using human memory structures to model knowledge within algebra virtual laboratory
63
Using human motion estimation for human-robot cooperative manipulation
64
Using human resource management suites to exploit team process improvement models
65
Using human simulation in developing implantable medical device leads
66
Using human-machine dialog to query shortcut on the map
67
Using Humanoid Robots as Instructional Media in Elementary Language Education
68
Using humanoid robots to study human behavior
69
Using humans as sensors in robotic search
70
Using humans as sensors: An estimation-theoretic perspective
71
Using Hungry Particle Swarm Optimization to Direct Orbits of Chaotic Systems
72
Using Hurst and Lyapunov Exponent For Hyperspectral Image Feature Extraction
73
Using Hybrid Algorithm for Automatic Recommendation Service
74
Using hybrid alignment for iterative sequence database searches
75
Using hybrid AOA/TOA information for distributed topology control in VANETs
76
Using Hybrid Artificial Bee Colony Algorithm to Extend Wireless Sensor Network Lifetime
77
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid
78
Using Hybrid Bayesian Networks to Model Dependent Project Scheduling Networks
79
Using Hybrid Branch Predictors to Improve Branch Prediction Accuracy in the Presence of Context Switches
80
Using hybrid cc to simulate multi-tier peg-in-hole problems
81
Using hybrid Constricted Particles Swarm and simulated annealing algorithm for electric motor design
82
Using Hybrid Data Mining Techniques for Facilitating Cross-Selling of a Mobile Telecom Market to Develop Customer Classification Model
83
Using Hybrid EP and Multi-Pass Dynamic Programming for Hydrothermal Coordination Considering Reasonable Spinning Reserve
84
Using hybrid fibre-coax networks for demand and inter-active services
85
Using hybrid GA-ANN to predict biological activity of HIV protease inhibitors
86
Using hybrid GPU algorithm for solving of EMC problems
87
Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines
88
Using Hybrid HMM-Based Speech Segmentation to Improve Synthetic Speech Quality
89
Using hybrid knowledge bases for missile siting problems
90
Using hybrid knowledge engineering and image processing in color virtual restoration of ancient murals
91
Using hybrid lexicon units and incorporating language constraints in speech recognition
92
Using hybrid metaheuristic approaches to solve bi-level linear programming problem for supply chain management
93
Using hybrid mobile applications for adaptive multimedia content delivery
94
Using hybrid model of Artificial Bee Colony and Genetic Algorithms in Software Cost Estimation
95
Using hybrid model with probability parameters to analysis queuing systems with layout constraints
96
Using hybrid modeling to simulate Maritime Transportation System of Systems (MTSoS)
97
Using hybrid Neural Network to address Chinese Named Entity Recognition
98
Using hybrid neural networks/expert systems for intelligent scheduling in flexible manufacturing systems
99
Using Hybrid Parsing Models as Predictors for a Symbolic Parser
100
Using Hybrid Particle Swarm Optimization for Process Planning Problem
101
Using hybrid planning for plan reparation
102
Using hybrid process simulation to evaluate manufacturing system component choices: Integrating a virtual robot with the physical system
103
Using hybrid quantum algorithm to solve VRPTW
104
Using Hybrid Schedules to Safely Outperform Classical Polyhedral Schedules
105
Using hybrid selection schemes to support QoS when providing multihop wireless Internet access to mobile ad hoc networks
106
Using hybrid simulation for a quadruped standing leap
107
Using hybrid simulation/emulation for experimental assessment of routing policy on mission outcomes
108
Using hybrid social emotional optimization algorithm with Metropolis rule to solve nonlinear equations
109
Using hybrid techniques for a continuous-time inference network
110
Using Hybrid Trust Model for Handling Inaccurate Resource
111
Using hybrid vector-harmonic potential fields for multi-robot, multi-target navigation in a stationary environment
112
Using hybrid weight grey correlation analysis method to evaluate the environment safety grade of uranium waste rock heap
113
Using Hybrid Wireless NOMOHi Devices in Green Rural Telecommunications Networks
114
Using Hydrophilic Effect to Fabricate Self-Assembled Microlens Array by UV/Ozone Modification
115
Using HYDRUS-2D Simulate Soil Water Dynamic in jujube root zone under drip irrigation
116
Using HYPER to teach datapath design techniques in an ASIC design course
117
Using hyperbolic tangent sigmoid transfer function for companding transform in OFDM system
118
Using HyperCard to rapidly prototype human-computer interfaces to CASE systems
119
Using hyperentangled photons to prepare bound entanglement
120
Using hypergraph as modeling language for generating test cases on demand
121
Using hypergraph knowledge representation for natural terrain robot navigation and path planning
122
Using Hypergraph-based Clustering Scheme for Traversal Prediction in Virtual Environments
123
Using Hyperlink Texts to Improve Quality of Identifying Document Topics Based on Wikipedia
124
Using hypermedia for complex technologies education
125
Using hypermedia for programmable logic devices education
126
Using hypermedia in computer-aided instruction
127
Using hypermedia to teach cardiovascular imaging: a prototype system based on hypercard
128
Using hyperpanometrics for complexity modelling and analysis
129
Using hyperprediction to compensate for delayed updates in value predictors
130
Using hyperquadrics for shape recovery from range data
131
Using hyperspectral imaging to characterize the coastal environment
132
Using Hyperspectral Indices to Diagnose Severity of Winter Wheat Stripe Rust
133
Using hyperspectral measurements to estimate ratio of leaf carbon to nitrogen in winter wheat
134
Using hyperspectral reflectance data for discrimination between healthy and diseased plants, and determination of damage-level in diseased plants
135
Using Hyperspectral Remote Sensing Data for Retrieving Canopy Chlorophyll and Nitrogen Content
136
Using hyperspectral remote sensing data for retrieving canopy water content
137
Using hyperspectral remote sensing data for retrieving total canopy chlorophyll and nitrogen content
138
Using hyperspectral remote sensing data in urban mapping over Kuala Lumpur
139
Using Hyperspectral Spectrometry and Functional Models to Characterize Vine-Leaf Composition
140
Using hypertext to locate reusable objects
141
Using hysteresis to improve performance in synchronous networks
142
Using hysteresis to reduce adaptation cost of a dynamic quorum assignment
143
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis
144
Using I.T. to improve the efficiency and accuracy of network data collection
145
Using I/O Schedulers to Reduce I/O Load in Virtualization Environments
146
Using I2O and I/O processors in embedded PCI systems. New software standard and processor type speed embedded PCI implementations
147
Using IDDQ drift testing to detect hydrogen in MOS devices
148
Using i? model towards ontology integration and completeness checking in enterprise systems requirement hierarchy
149
Using i2F as a data collector for a TIRS-based expert system [Integrated Interface Facility]
150
Using i2F at the help desk [integrated interface facility]
151
Using IACO and QPSO to solve spatial clustering with obstacles constraints
152
Using IBIS-AMI models to study clock recovery loop performance
153
Using IC cards to remotely login passwords without verification tables
154
Using ICA to Remove Eye Blink and Power Line Artifacts in EEG
155
Using Ice Clouds for Mitigating the EarthCARE Doppler Radar Mispointing
156
Using Icebox to View and Explore Satellite Images of the Gulf of Maine
157
Using ICT and photonic innovation to create a sustainable society that is friendly to humans and the earth
158
Using ICT for Enhancing English Teaching: A Quasi-experimental Study
159
Using ICT in higher education: Teachers of electrical engineering department at the University of Bechar: Case study
160
Using ICT to improve customer satisfaction in small and medium sized construction companies: A study among malaysian construction SMEs
161
Using ICT to overcome barriers to behaviour change and implement lifestyle interventions
162
Using ICT to strengthen local capacities: the experience of Cap-Net
163
Using ICT to Teach Sign Language
164
Using ICT-Controlled Plug-in Electric Vehicles to Supply Grid Regulation in California at Different Renewable Integration Levels
165
Using IDEAS in Teaching Logic, Lessons Learned
166
Using IDEF0 for dynamic process analysis
167
Using IDEF0/Petri Net for Ontology-Based Task Knowledge Analysis: The Case of Emergency Response for Debris-Flow
168
Using identical values for encryption of data
169
Using identity and trust with key management for achieving security in Ad hoc Networks
170
Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment
171
Using identity-based secret public keys cryptography for heuristic security analyses in grid computing
172
Using IDFT technique for antenna´s time-domain near-field measurements
173
Using idle disks in a cluster as a high-performance storage system
174
Using idle workstations to implement predictive prefetching
175
Using IEC 61850 analogue goose messages for OLTC control of parallel transformers
176
Using IEC 61850 data transfer beyond the substation for enhanced protection for distribution networks
177
Using IEC 61850 process bus to meet NERC PRC-005-2 Condition Based Maintenance requirements
178
Using IEDScout software for managing multivendor IEC61850 IEDs in substation automation systems
179
Using IEEE 1394 network for cluster computing
180
Using IEEE 1453 Limits to Determine Flicker Compliance - How Does it Compare to Using the GE Curve
181
Using IEEE 1588 and boundary clocks for clock synchronization in telecom networks
182
Using IEEE 802.11e MAC for QoS over wireless
183
Using IEEE Flash to estimate transmission and distribution line lightning performance
184
Using IEEE P1149.4
185
Using IEEE standard 1057 for testing analog-to-digital converters
186
Using IEEE standards to support America´s Army gaming development
187
Using IEEE-1149.1 for in-circuit emulation
188
Using IEMCAP for digital circuit analysis
189
Using iFMI spectral registration for video stabilization and motion detection by an Unmanned Aerial Vehicle (UAV)
190
Using IFS as an Encryption Method
191
Using IGBT in Quench Protection of a 2 MJ SMES Magnet
192
Using IGS Data to Analyze the Long-Term Variations of Total Electron Content
193
Using IHBMO method for fuzzy stochastic long-term model with considered uncertainties for deployment of Distributed Energy Resources
194
Using IJTAG digital islands in analogue circuits to perform trim and test functions
195
Using ILA testing for BIST in FPGAs
196
Using ill-conditioned theory for physical-layer security in time-variant channels
197
Using illumination invariant descriptors for recognition
198
Using ILS mathematical model and measurements for detailed evaluating results of thermal response tests
199
Using image classification for biomedical literature retrieval
200
Using image contour recognition in GIS navigation
201
Using image databases to relate internal anatomy to surface features in human motion and animation
202
Using Image Deconvolution to Increase the Ability to Detect Stars and Faint Orbital Objects in CCD Imaging
203
USING Image Features to Identify Camera Sources
204
Using Image Flow to Detect Eye Blinks in Color Videos
205
Using image gradient as a visual feature for visual servoing
206
Using image information and partial least squares method to estimate mineral concentrations in mineral flotation
207
Using image magnification techniques to improve classification of hyperspectral data
208
Using image metadata for automatic patient staging in Lymphoma
209
Using Image Morphing for Memory-Efficient Impostor Rendering on GPU
210
Using Image Pair Method to Share Stereo Images through Network
211
Using image planes on DC motors to filter high frequency noise
212
Using Image Processing Algorithms for Energy Efficient Routing Algorithm in Sensor Networks
213
Using image processing in grading tile with Gabor wavelet
214
Using image processing methods for diagnosis diabetic retinopathy
215
Using Image Processing Methods to Improve the Explosive Detection Accuracy
216
Using image processing methods to reduce dazzle in the eyes from a digital projector
217
Using Image Processing on MRI Scans
218
Using Image Processing Technique for the Studies on Temporal Development of Air Quality
219
Using image processing technology for water quality monitoring system
220
Using image profiles and integral images for efficient calculation of sparse optical flow fields
221
Using image quality measures and features to choose good images for classification of ISAR imagery
222
Using image registration to reconstruct spatiotemporal electrical activity in cardiac optical mapping studies
223
Using image signature for effective and efficient reduced-reference image quality assessment
224
Using image theory for finite electrostatic problems-some observations and guidelines
225
Using Image-Based Metrics to Model Pedestrian Detection Performance With Night-Vision Systems
226
Using image-based regression to acquire freehand 3D ultrasound
227
Using images combined with DEM in classifying forest vegetations
228
Using Images to create a Hierarchical Grid Spatial Index
229
Using IMM adaptive estimator in GPS positioning
230
Using immersive video to evaluate future traveller information systems
231
Using immersive virtual environments for certification
232
Using Immune Algorithm to Optimize Anomaly Detection Based on SVM
233
Using immune algorithm to optimize location of traffic counting points
234
Using immunology principles for fault detection
235
Using impact analysis in industry
236
Using impedance biosensors to distinguish the PC12 cells adhesion and differentiation
237
Using impedance controlled robots for simulating manipulation tasks occurring in a gravityless environment
238
Using impedance imaging to determine intracavitary probe location
239
Using impedance measurement to improve the reliability of traveling-wave distance protection
240
Using impedance spectroscopy for enhanced capacitance-voltage measurements on solar cells with multiple space charge regions and a structured surface
241
Using Impinging Stream to Kill Algae, Fungi and Bacteria in Cooling Water of Thermal Power Plants
242
Using Implications for Online Error Detection
243
Using Implicit Enumeration to Solve 0-1 Planning Problem Based on DNA Computing
244
Using implicit features for enhancing the immersive object representation in multimodal virtual reality environments
245
Using implicit polynomials for image compression
246
Using Implicit Relevane Feedback to Advance Web Image Search
247
Using Importance Measures in the improvement of complex process safety
248
Using importance of transactions and optimistic concurrency control in firm real-time databases
249
Using importance-performance analysis in evaluating institutions of higher education: A case study
250
Using Importance-Performance Analysis to Evaluate E-Business Strategies among Small Businesses
251
Using imprecise concurrency control and speculative lending of prepared data-item in distributed real-time nested transactions
252
Using Improved Domain Decomposition Method and Radial Basis Functions to Determine Electromagnetic Fields Near Material Interfaces
253
Using Improved FOAF to Enhance BPEL-extracted RBAC Capability
254
Using improved imaging sensor pattern noise for source camera identification
255
Using improved K-nearest neighbor method to identify anti-and pro-apoptosis proteins
256
Using Improved Power Electronics Modeling and Turbine Control to Improve Wind Turbine Reliability
257
Using improved self-organizing map for partial discharge diagnosis of large turbogenerators
258
Using Improved Shannon-Fano-Elias Codes for Data Encryption
259
Using improved SVM decision tree to classify HRRP
260
Using improved time of use demand response in optimal operation of microgrid
261
Using Improved Transistor Models in Computer-Aided Analysis of an RGB Video Amplifier
262
Using improved variable dimension fractal to model seawall settlement
263
Using improvisational theater in team-based teaching activities
264
Using impulse Radio UWB for medical monitoring sensor networks: a performance evaluation
265
Using Imputation Techniques to Help Learn Accurate Classifiers
266
Using IMS as a Service Framework
267
Using IMS basic LTI to integrate games in LMSs — Lessons from Game×Tel
268
Using IMS Learning Design to Author Authentic Learning Examples in Mobile Context
269
Using IMS Learning Design to model collaborative learning activities
270
Using in situ and Satellite Hyperspectral Data to Estimate the Surface Suspended Sediments Concentrations in the Pearl River Estuary
271
Using in Vivo Bioluminescence Imaging to Shed Light on Cancer Biology
272
Using in vivo spinally-evoked potentials to assess functional connectivity along the spinal axis
273
Using In vivo subject-specific musculotendon parameters to investigate control strategy changes after stroke: An EMG-driven model of elbow joint
274
Using Inactivity to Detect Unusual behavior
275
Using in-air Acoustic Vector Sensors for tracking moving speakers
276
Using Incentive Systems to Increase Information Quality in Business Intelligence: A Quasi-Experiment in the Financial Services Industry
277
Using incentives to increase availability in a DHT
278
Using in-class assessment to inform signals and systems instruction
279
Using in-class debates as a teaching tool
280
Using Incomplete Fuzzy Linguistic Preference Relations to Characterize User Profiles in Recommender Systems
281
Using Incomplete Information for Complete Weight Annotation of Road Networks
282
Using incomplete online metric maps for topological exploration with the Gap Navigation Tree
283
Using incomplete satisfiability modulo theories to determine robotic tasks
284
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
285
Using incompletely cooperative game theory in wireless LANs
286
Using Incompletely Cooperative Game Theory in Wireless Mesh Networks
287
Using Incompletely Cooperative Game Theory in Wireless Sensor Networks
288
Using incorrect speculation to prefetch data in a concurrent multithreaded processor
289
Using increased order controllers in mixed H2/H optimization
290
Using Increased Structural Detail of the Cortex to Improve the Accuracy of Modeling the Effects of Transcranial Magnetic Stimulation on Neocortical Activation
291
Using Incremental Addition to Evaluate the Grouping Quality of Document Classification
292
Using incremental clustering technique in collaborative filtering data update
293
Using Incremental Fuzzy Clustering to Web Usage Mining
294
Using incremental learning algorithms in the search for minimal and effective fuzzy models
295
Using incremental learning for transition from rule based behavior to motion sequences for motor control of a flexible robot system
296
Using incremental learning method for adaptive network intrusion detection
297
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems
298
Using Incremental PLSI for Threshold-Resilient Online Event Analysis
299
Using increment-dimensional precise integration method for solving transient heat conduction problems discretized by the MLPG method
300
Using independent component analysis & dynamical embedding to isolate seizure activity in the EEG
301
Using independent component analysis to obtain feature space for reliable ECG Arrhythmia classification
302
Using Independent Component Analysis to Research Heart Rate Variability
303
Using independent components analysis to calculate intravascular contrast agent concentration in prostate cancer
304
Using independent subspace analysis for selecting filters used in texture processing
305
Using independent subspace analysis to build independent spectral representations of images
306
Using Index in the MapReduce Framework
307
Using indexed sequence diagrams to recover the behaviour of AJAX applications
308
Using indexing functions to reduce conflict aliasing in branch prediction tables
309
Using indexing structures for resource descriptors extraction from distributed image repositories
310
Using indicator kriging to delineate and map the spatial patterns of zinc soil pollution
311
Using Indicators During Synchronous Tutoring of Practical Work
312
Using indicators for system complex safety
313
Using indirection to minimize message delivery latency on cache-less many-core architectures
314
Using individuality to track individuals: Clustering individual trajectories in crowds using local appearance and frequency trait
315
Using individualized continuous patient education (iCOPE) platform to facilitate smoking cessation in hospitalized patients
316
Using individualized link power settings for energy optimization in hierarchical wireless sensor networks (WSNs)
317
Using Indoor Location to Assess the State of Dementia Patients: Results and Experience Report from a Long Term, Real World Study
318
Using induction motor stator windings to extract speed information
319
Using induction to prove properties of distributed programs
320
Using inductive method to teach nuclear energy
321
Using Inductive Reasoning to Find the Cause of Process Delays
322
Using inductive voltage divider to measure the millivolt ac voltage at frequencies up to 100 kHz
323
Using industrial load flexibility to increase hydroelectric generation efficiency
324
Using industrial standards on PLC programming learning
325
Using industry data to facilitate the smart meter rollout
326
Using industry-grade test equipment in a digital test and product engineering lab course
327
Using industry-university partnerships for MOT educational enhancement
328
Using inertial and magnetic sensors for hand tracking and rendering in wearable haptics
329
Using inertial sensors of iPhone 4 for car navigation
330
Using Infection Markers as a Vaccine against Malware Attacks
331
Using inference for evaluating models of temporal discourse
332
Using influence diagrams for PERT
333
Using influence diagrams for representing organizational and political factors in information system design
334
Using influence diagrams for software risk analysis
335
Using influential nodes of stock network to measure Tehran Stock Exchange index
336
Using infographies as a tool for introductory data analytics education in 9–12
337
Using informal and formal techniques for the reverse engineering of C programs
338
Using informal and formal techniques for the reverse engineering of C programs
339
Using informatic tools in automated manufacturing
340
Using information about weather conditions to define availability and reliability of FSO links
341
Using Information and Communication Technologies in Intermodal Freight Transportation: A case study
342
Using Information and Communication Technologies in language teaching and learning in the Institute of Physics and Technologies, Tomsk Polytechnic University
343
Using Information and Communication Technologies to Support Deep Learning in a Third-Level On-Campus Programme: A Case Study of the taught Master of Arts in E-Learning Design and Development at the University of Limerick
344
Using information and communication technology to improve the efficiency of African border posts
345
Using information and Communication Technology tools to enhance traditional electrical Engineering Education
346
Using Information Centric Networking for Mobile Devices Cooperation at the Network Edge
347
Using Information Content to Evaluate Semantic Similarity on HowNet
348
Using information criteria in Dempster-Shafer´s basic belief assignment
349
Using information density to navigate the Web
350
Using information entropy bounds to design VLSI friendly neural networks
351
Using Information Entropy to Analyze Dynamic Reserves of Emergency Material
352
Using information entropy to quantify uncertainty in distribution networks
353
Using Information Extraction for Quality Analysis in Human Authentication
354
Using Information Filtering in Web Data Mining Process
355
Using Information for Classification of Knowledge Works
356
Using information fragments to answer the questions developers ask
357
Using Information from Prior Runs to Improve Automated Tuning Systems
358
Using information gain to build meaningful decision forests for multilabel classification
359
Using information generated by a discrete event simulation to evaluate real options in a research and development environment
360
Using Information Management Architecture to Support Flexible Supply Chain Management
361
Using information management to integrate smart vehicle subsystems
362
Using information measures for determining the relevance of the predictive variables in learning problems
363
Using Information Metrics and Molecular Communication to Detect Cellular Tissue Deformation
364
Using information on membership function shapes in asymptotically exact triangulation approaches
365
Using information retrieval for software reuse
366
Using information retrieval to support software maintenance tasks
367
Using information structures to gain competitive advantage
368
Using information structures to gain competitive advantage
369
Using information systems to structurally map workplace injury
370
Using information technology
371
Using information technology to enhance engineering education
372
Using Information Technology to Facilitate Pooling of Retail Inventories
373
Using Information Technology to Improve Health Information Literacy in Singapore - An Exploratory Study
374
Using Information Technology to Improve the Mental Health Education of University Students
375
Using information technology to leverage research productivity
376
Using information technology to manage customer relationships: lessons for marketing in diverse industries
377
Using Information Technology to redesign business process: Case study in re-engineering the “increase credit limit” process at AUB
378
Using information theoretic vector quantization for GMM based speaker verification
379
Using information theoretic vector quantization for inverted MFCC based speaker verification
380
Using information theory to detect voice activity
381
Using information theory to measure call site information of system call in anomaly detection
382
Using information theory to more fully exploit the electromagnetic spectrum: lessons for regulators
383
Using information theory to optimize wireless networks
384
Using Information Trustworthiness Advice in Decision Making
385
Using information visualization for accessing learning object repositories
386
Using informational confidence values for classifier combination: an experiment with combined on-line/off-line Japanese character recognition
387
Using information-flow theory to support information interoperability in the grid
388
Using information-theoretic measures to assess association rule interestingness
389
Using infrared illumination to improve eye & face tracking in low quality video images
390
Using infrared imaging technology for concealed weapons detection and visualization
391
Using infrared impulses to transmit data asynchronously
392
Using Infrared Radiation to measure burger fat content
393
Using Infrared Satellite Image Processing to Rapidly Estimate Coastal Flooding Induced by Tropical Cyclones
394
Using infrared sensors and the Phong illumination model to measure distances
395
Using Infrared Sightglasses to Enable Predictive Maintenance of a High Voltage Motor System and Comply with NFPA70E Safety Requirements
396
Using infrared thermography in the diagnostics of breast and lung oncological pathologies
397
Using infrared thermography in the diagnostics of breast and lung oncological pathologies
398
Using infrared thermography to detect age degradation in EPROM chips
399
Using infrared watermark technology to design AR markers with different hiding effects
400
Using infrastructure IPs to support SW-based self-test of processor cores
401
Using infrastructure-provided context filters for efficient fine-grained activity sensing
402
Using inherent command and control vulnerabilities to halt DDoS attacks
403
Using inheritance to derive non-conflicting survivability strategies
404
Using injection-locked Fabry-Perot laser diode with 10% frond-facet reflectivity for 10 Gbps upstream PON access
405
Using Ink-Jet Printing and Coffee Ring Effect to Fabricate Refractive Microlens Arrays
406
Using in-line film measurement as a proxy for device matching to speed up process change qualification
407
Using In-Memory Analytics to Quickly Crunch Big Data
408
Using in-memory encrypted databases on the cloud
409
Using inner shell X-rays as an ion beam diagnostic
410
Using innovation diffusion theory to guide collaboration technology evaluation: work in progress
411
Using innovation science to minimize entrepreneurial risk
412
Using innovation to drive Moore’s Law
413
Using Innovative Differential Evolution Algorithm for OFDM Reducing PAPR
414
Using innovative electrical and electronic devices in the reduction of panel size
415
Using innovative pedagogical practices in disciplines of engineering and computing graduation in Brazil
416
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
417
Using Input Buffers for Streaming XSLT Processing
418
Using input command pre-shaping to suppress multiple mode vibration
419
Using input condition monitoring to improve the stability of digitally controlled power factor correcting converters
420
Using input current and output voltage ripple to estimate the output filter condition of switch mode DC/DC converters
421
Using input current shaper in the implementation of high-power-factor electronic ballasts
422
Using input process indicators for dynamic decision making
423
Using input shaping to repress two-mode residual vibration on aerial lifts
424
Using input/output queues to increase LDPC decoder performance
425
Using input-space bisection and backpropagation as a method to emulate complex numerical simulations for design decision making
426
Using Input-to-Output Masking for System-level Vulnerability estimation in high-performance processors
427
Using Inquiry to Expose Undergraduates to ITS
428
Using inquiry-based activities to repair student misconceptions related to Heat, energy and temperature
429
Using insertion convolutional code for speech transmission over GERAN 8PSK voice bearers
430
Using in-situ holographic microscopy for ocean particle characterization
431
Using insolubility wave-front for polymer deposition on self-assembling microfabricated parts
432
Using inspection data for defect estimation
433
Using inspections to investigate program correctness
434
Using Instance Texts to Improve Keyword-Based Class Retrieval
435
Using Instance Typicality to Build Compact and Accurate Neural Network Classifiers
436
Using Instant Messaging and Annotation Services to Improve Undergraduate Programming Courses in Web-Based Collaborative Learning
437
Using instruction sequence abstraction for shellcode detection and attribution
438
Using instructional design model to implement open lesson with lesson study approach for online teacher community
439
Using instructional television (ITV) to help implement faculty technology proficiency certification
440
Using instrument transformers in a wider frequency range
441
Using insulation aging to size transformers in high-ambient temperature, secondary-selective applications
442
Using Insulation Aging to Size Transformers in High-Ambient-Temperature Secondary-Selective Applications
443
Using insulation in dry-type and gas-filled transformers
444
Using Insulation Resistance as a Dew Point Transducer for Process Control
445
Using Intaglio-Shaped Bumps for Increasing the Conductive Particle Density in Lateral Thermosonic Process With Anisotropic Conductive Film
446
Using Integer Constraint Solving in Reuse Based Requirements Engineering
447
Using integer equations for high level formal verification property checking
448
Using integer equations to check PSL properties in RT level design
449
Using Integer Linear Programming in Test-bench Generation for Evaluating Communication Processors
450
Using integer programming to refine Lagrangian-based unit commitment solutions
451
Using integral coil to drive a two-axis gyroscope
452
Using integral equation method for finewire objects to calculate characteristics of microstrip antenna arrays
453
Using integral equation methods to incorporate open area test site effects in finite modelling techniques
454
Using integral reconstructor for nonlinear-controlled boost converter
455
Using integrated color and texture features for automatic hair detection
456
Using integrated diagnostics on automatic test equipment
457
Using integrated generator diagnosis to perform condition based maintenance
458
Using integrated metamodeling to define OO design patterns with Object-Z and UML
459
Using Integrated Model to Assess the Efficiency of Electric Distribution Companies
460
Using Integrated Optical Feedback to Counter Pixel Aging and Stabilize Light Output of Organic LED Display Technology
461
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study
462
Using Integrative Models in an Advanced Heterogeneous System Simulation
463
Using integro-differential operators on low cost underwater autonomous vehicles
464
Using Intelligent Agent Technique to Setup and Administer Mobile Peer-to-Peer Network
465
Using intelligent agent to build toddler monitoring system
466
Using intelligent agents for distributed measurements
467
Using intelligent agents for knowledge management in e-commerce
468
Using Intelligent Agents for Social Sensing across Disadvantaged Networks
469
Using Intelligent Agents in Conjunction with Heuristic Model for Negotiating ebXML CPP
470
Using intelligent agents to combine heterogeneous distributed data
471
Using intelligent agents to identify missing and exploited children
472
Using intelligent agents to manage business processes
473
Using intelligent agents to manage fuzzy business processes
474
Using intelligent agents to repurpose administrative data in fostering disease prevention in an outpatient context: the case of pneumococcal vaccination
475
Using intelligent agents to understand management practices and retail productivity
476
Using intelligent computer technology to measure the intellectual development of engineering students
477
Using Intelligent Data Sources to Monitor Unusual Behaviors in Individual´s Health Data
478
Using intelligent digital cameras to monitor aerodrome surface traffic
479
Using intelligent mobile agents to dynamically determine itineraries with time constraints
480
Using intelligent multi-agent systems for shipboard power systems reconfiguration
481
Using Intelligent Multi-Agent Systems to Model and Foster Self-Regulated Learning: A Theoretically-Based Approach Using Markov Decision Process
482
Using intelligent prefetching to reduce the energy consumption of a large-scale storage system
483
Using Intelligent Proxies to Develop Self-Adaptive Service-Based Systems
484
Using intelligent system approach for very short-term load forecasting purposes
485
Using intelligent systems in experimental signal analysis for power transformer diagnosis
486
Using Intelligent Transportation Systems to Adapt to Potential Climate Change Impacts on Seasonal Truck Weight Limits
487
Using Intelligent Tutors to Teach Students How APIs Are Used for Software Engineering in Practice
488
Using intent information to investigate the relationship between missed detections and false alarms in conflict detection verification
489
Using intentional source-code views to aid software maintenance
490
Using Intentions and Plans of Mobile Activities to Guide Geospatial Web Service Composition
491
Using Interacting Forces to Perform Semi-supervised Learning
492
Using interaction between two nonlinear systems to improve IIP3 in active mixers
493
Using interaction costs for microarchitectural bottleneck analysis
494
Using interaction protocols to control vision systems
495
Using interaction signatures to find and label chairs and floors
496
Using interactive and multi-touch technology to support decision making in multidisciplinary team meetings
497
Using Interactive Artificial Bee Colony to Forecast Exchange Rate
498
Using interactive blackboard chats to promote student learning in physics
499
Using Interactive GA for Requirements Prioritization
500
Using Interactive Graphical Tools to Overcome the "Collage Effect" in Collaborative Learning Environments
501
Using Interactive Graphics for Fitting Surfaces to Scattered Data
502
Using Interactive Hybrid Online Labs for rapid prototyping of digital systems
503
Using interactive technology for lectures in higher education information technology
504
Using interactive tools to teach/learn Sliding Mode Control
505
Using interactive video for on-line blended learning in engineering education
506
Using Interactive Video Technology for the Development of Game-Based Learning
507
Using Interactive Videoconference to Promote Active Learning in a Blended Learning Environment
508
Using interactive virtual characters in social neuroscience
509
Using Interactive Visual Reasoning to Support Sense-Making: Implications for Design
510
Using interactivity in computer-facilitated learning for efficient comprehension of mathematical abstractions
511
Using interceptors to enhance CORBA
512
Using interchangeable virtual instrument (IVI) drivers to increase test system performance
513
Using Inter-comment Similarity for Comment Spam Detection in Chinese Blogs
514
Using interdisciplinary integration in the engineering/technology classroom to broaden student learning
515
Using Interest Points for Robust Visual Detection and Identification of Objects in Complex Scenes
516
Using Interest-Aware Probabilistic for Leisure Information Dissemination in VANETs
517
Using interesting examples for teaching digital image processing course
518
Using interface definition languages to support path expressions and programming by contract
519
Using Interface Waves for Monitoring Fatigue Damage Development in Adhesively Bonded Joints
520
Using interference to determine the phase change of a reflected GPR pulse
521
Using Inter-file Similarity to Improve Intra-file Compression
522
Using inter-frame dependence history to select intra-refresh blocks
523
Using interleaved execution to resolve cyclic dependencies in time-based block diagrams
524
Using interleaving to ameliorate the effects of packet loss in a video stream
525
Using Internal Quantum Efficiency to Determine Front Surface Recombination Velocity of Crystalline Silicon Solar Cells
526
Using internal redundant representations and limited bypass to support pipelined adders and register files
527
Using International English to prepare technical text for translation
528
Using Internet based concurrent engineering tools to educate multinational students about the design, process planning and manufacture of new products
529
Using Internet Protocols to Implement IEC 60870-5 Telecontrol Functions
530
Using Internet technologies for secure substation access and control
531
Using Internet Technology for Information Technology Popularization in Developing Country
532
Using Internet technology to refer patients to consultants
533
Using internet traffic self-similarity for detection of network anomalies
534
Using Internet-based, distributed collaborative writing tools to improve coordination and group awareness in writing teams
535
Using Interphase Power Controller to control the short circuit level in transmission power network
536
Using interpolation to simplify explicit model predictive control
537
Using inter-positional Transfer Functions in 3D-sound
538
Using Interpretive Structural Modeling in Senior High School Environmental Studies
539
Using interval constraint propagation for pseudo-Boolean constraint solving
540
Using interval methods in the context of robust localization of underwater robots
541
Using interval particle filtering for marker less 3D human motion capture
542
Using interval temporal logic and inference rules for the automatic generation of multimedia presentations
543
Using interval type-2 fuzzy logic to analyze Turkish emotion words
544
Using interval type-2 fuzzy logic to translate emotion words from Spanish to English
545
Using interval-valued fuzzy sets to formalize default reasoning
546
Using interviews to Identify Student misconceptions in dynamics
547
Using Intradisk Parallelism to Build Energy-Efficient Storage Systems
548
Using Intra-Line Level Pairing for Graceful Degradation Support in PCMs
549
Using intranet technology to access valuable information in a clinical environment fast and efficiently
550
Using intranets: preliminary results from a socio-technical field study
551
Using intrinsic images for shadow handling
552
Using intrinsic surface geometry and absolute invariants for 3D face alignment and registration
553
Using introspection and prototype driven to achieve design analysis in the process of concept generation based on information processing
554
Using introspective software-based testing for post-silicon debug and repair
555
Using invariant feature descriptors for an efficient image retrieval
556
Using invariant features with a polarimetric forward-looking ground penetrating radar
557
Using invariant functions and invariant relations to compute loop functions
558
Using invariant relations in the termination analysis of while loops
559
Using Invariants for Anomaly Detection: The Case Study of a SaaS Application
560
Using invariants of an extended conceptual model to generate reusable consistency control
561
Using invariants to optimize formal specifications before code synthesis
562
Using inverse electrocardiography to image myocardial infarction
563
Using inverse image frequency for perception-based color image quantization
564
Using inverse linear quadratic method for systematic tuning of performance index in nonlinear model predictive control
565
Using Inverse Nonlinearities in Robust Output Feedback Guaranteed Cost Control of Nonlinear Systems
566
Using inverted files to compress text
567
Using Inverted Indexing to Semantic WEB Service Discovery Search Model
568
Using inverter structure for 2∼6GHz low power high gain low noise amplifier
569
Using Inverters for DC Motor Control
570
Using invisible watermarks to protect visibly watermarked images
571
Using Ionizers to Reduce Electrostatically Adhered Particles on Wafer Backside
572
Using IoTGolog to formalize IoT scenarios
573
Using IP identification for fragmentation resilient data embedding
574
Using IP multicast to improve communication in large scale mobile agent systems
575
Using IP networks as a deviceless storage for future portable computers
576
Using iPad 2 with note-taking apps to enhance traditional blackboard-style pedagogy for mathematics-heavy subjects: A case study
577
Using iPads/Tablets as a teaching tool: Strategies for an electrical engineering classroom
578
Using IPDR to transfer network management and measurement information
579
Using IPSec to Secure Multi-Level Data Classification in MLS Networks
580
Using iPSS as a new run-time for service-oriented manufacturing executive systems
581
Using IPv6 and 6LoWPAN for home automation networks
582
Using IR methods for labeling source code artifacts: Is it worthwhile?
583
Using Iris Recognition Algorithm, Detecting Cholesterol Presence
584
Using Iris recognition to secure medical images on the cloud
585
Using irregular pyramid for text segmentation and binarization of gray scale images
586
Using IS modeling to understand the effect of growth conditions and film attributes on AC conduction in CVD diamond
587
Using IS to Assess an Electric Power System´s Real-Time Stability
588
Using ISA services to manage lab sessions with embedded lab servers
589
Using ISDN-30 for coronary angio data transport
590
Using ISIS to support the teaching of VLSI design
591
Using island-style bi-directional intra-CLB routing in low-power FPGAs
592
Using ISO 27001 in teaching information security
593
Using ISO 9000 to elicit business rules
594
Using ISO 9126 with QoS DiffServ model for evaluating software quality in mobile environments
595
Using ISO work-in-progress documents in teaching software engineering: an experiment
596
Using isolated landmarks and trajectories in robot navigation
597
Using isolated vowel sounds for classification of Mild Traumatic Brain Injury
598
Using Isolation Spheres for Cooperative Processes Correctness
599
Using isosurface methods for visualizing the envelope of a swept trivariate solid
600
Using Issue Tracking Tools to Facilitate Student Learning of Communication Skills in Software Engineering Courses
601
Using issues to teach diversity: an interactive learning approach
602
Using IT to Open Previously Unprofitable Markets
603
Using IT tool to manage expert knowledge: Case study: KMORE implementation in TELKOM R&D center
604
Using IT/ICT as a new medium toward implementation of interactive architectural communication cultures
605
USING ITEM-ATTENDANT INFORMATION AND COMMUNICATIONS TECHNOLOGIES TO IMPROVE SUPPLY CHAIN VISIBILITY
606
Using iterated function systems to model discrete sequences
607
Using Iterative Learning Control methods for 2-D systems
608
Using Iterative MapReduce for Parallel Virtual Screening
609
Using iterative refinement to find reusable software
610
Using iterative simulation to incorporate load-dependent lead times in master planning heuristics
611
Using iterative test generation in a PC based guided probe testing system
612
Using ITILv3 methodology for implementing new e-mail services in operator for producing and distributing electrical energy
613
Using ITK to obtain motion transform in anatomically guided PET motion correction for simultaneous PET/MR
614
Using ITL and Tempura for large-scale specification and simulation
615
Using iTRAQ quantitative proteomics to identify differentially expressed proteins in saliva from breast cancer patients with white tongue coating and yellow tongue coating
616
Using ITS data fusion to examine traffic dynamics on a freeway with variable speed limits
617
Using ITS data to manage transportation infrastructure
618
Using ITS in public transport and in emergency services
619
Using ITS to Improve the Capacity of Freeway Merging Sections by Transferring Freight Vehicles
620
Using ITU-R 370 Method to Analyse Spread (Propagation) Conditions in Land Mobile Systems
621
Using ITU-T X.805 for comprehensive network security assessment and planning
622
Using IVDS and VBI for interactive television
623
Using IVDS and VBI for Interactive Television
624
Using IVI drivers to increase test system performance
625
Using IVI in .NETand the upcoming IVI .NET standard
626
Using IVI-C class drivers to achieve the ultimate in instrument interchangeability
627
Using J2EE on a large, Web-based project
628
Using Jackson methods to implement software process improvement
629
Using Jade agent framework to prototype an e-Science workflow bus
630
Using Jason to Develop Refactoring Agents
631
Using Java and CORBA for implementing Internet databases
632
Using Java applets and CORBA for multi-user distributed applications
633
Using Java for plasma PIC simulations
634
Using Java Hartstone benchmark in a real-time systems course
635
Using Java in ingeneering and scientific computations and in designing systems
636
Using Java management extension standards as the basis for IceCube´s experiment control
637
Using Java Method Traces to Automatically Characterize and Model J2EE Server Applications
638
Using Java Mobile Agents and PSO for Implementing a Distributed Antenna-Optimization Platform [EM Programmer´s Notebook]
639
Using Java optimized processor as an intellectual property core beside a RISC processor in FPGA
640
Using Java technology to realize Web-based multimedia system
641
Using Java to add “stored procedures” to databases
642
Using Java to embed complex simulation media into surgical training environments
643
Using Java/ASP to implement a web-based SPC courseware system
644
Using JavaBeans to Realize a Domain-Specific Component Model
645
Using JavaTM to Design Forensically Resistant Applications
646
Using Jaza to Animate RoZ Specifications of UML Class Diagrams
647
Using J-DSP to introduce communications and multuviedia technologies to high schools
648
Using Jeroo to introduce object-oriented programming
649
Using JERS-1 L-band SAR to estimate methane emissions from the Jau´ river floodplain (Amazon/Brazil)
650
Using JessTab to integrate Protege and Jess
651
Using JIGSAW-type collaborative learning for integrating foreign students in embedded system engineering
652
Using Jini for high-performance network computing
653
Using JIRA and Redmine in requirement development for agile methodology
654
Using JiTT to design: How blending learning is to be improved by mobile learning?
655
Using jitter and shimmer in speaker verification
656
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
657
Using job advertisements to inform curricula design for the key global technical challenges
658
Using join operations as reducers in distributed query processing
659
Using joint Particle Swarm Optimization and Genetic Algorithm for resource allocation in TD-LTE systems
660
Using journals in the engineering classroom
661
Using Jpcap API to Monitor, Analyze, and Report Network Traffic for DDoS Attacks
662
Using JPCAP to Prevent Man-in-the-Middle Attacks in a Local Area Network Environment
663
Using JPEG and JPEG2000 compressions for fast image quality metrics based on free energy theory
664
Using JPEG data compression for remote moving window display
665
Using JPEG to Measure Image Continuity and Break Capy and Other Puzzle CAPTCHAs
666
Using JPEG2000 on-board mini-satellites for image-driven compression
667
Using JPL Micro-Imagers for the Johnson Space Center International Space Station Cell Growth Experiment
668
Using JSON to manage communication between services in the Internet of Things
669
Using JULE to generate a compliance test suite for the UML standard
670
Using Julian set patterns for higher robustness in correlation based watermarking methods
671
Using K-12 STEM education and outreach to inspire student-driven leadership initiatives in Singapore
672
Using Kademlia for the configuration of B3G radio access nodes
673
Using Kalman filter to attenuate noise in learning and repetitive control can easily degrade performance
674
Using Kalman Filter with Morphological Image Operation Tracking a Moving Target in Radiotherapy
675
Using Kalman filtering to analyze oscillometric blood pressure waveforms
676
Using Kalman Filtering to Predict Time-Varying Parameters in a Model Predicting Baroreflex Regulation During Head-Up Tilt
677
Using Kalman innovations for transmission control of location updates in a wireless network
678
Using Karel J collaboratively to facilitate object-oriented learning
679
Using Karnaugh maps to solve Boolean equations by successive elimination
680
Using Kasa Method to Separate Target´s RCS Characters from Background in Electromagnetic Sensing within Anechoic Chamber Measurement
681
Using KATE for case-based reasoning in maintenance
682
Using Katz Centrality to Classify Multiple Pattern Transformations
683
Using Kautz filter for adaptive acoustic echo cancellation
684
Using k-d trees for robust 3D point pattern matching
685
Using KEEL software as a educational tool: A case of study teaching data mining
686
Using Keeper Control and Body Bias for Fine Grained Threshold Voltage Compensation in Dynamic Logic
687
Using Kerberos in operations systems
688
Using Kerberos to secure TLS Protocol
689
Using Kernel Alignment to Select Features of Molecular Descriptors in a QSAR Study
690
Using kernel couplings to predict parallel application performance
691
Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization
692
Using Kernel Discriminant Analysis to Improve the Characterization of the Alternative Hypothesis for Speaker Verification
693
Using kernel hypervisors to secure applications
694
Using kernel PCA to improve eigenvoice speaker adaptation
695
Using key performance indicators as knowledge-management tools at a regional health-care authority level
696
Using key points to improve robust reference watermarking algorithm
697
Using key trees for securing military multicast communication
698
Using keystroke dynamics for gender identification in social network environment
699
Using Keystroke-Level Model to Analyze Advance IOS Optimization Techniques
700
Using Keystroke-Level Model to analyze IOS optimization techniques
701
Using keyword extraction for Web site clustering
702
Using Keyword Spotting and Replacement for Speech Anonymization
703
Using Keywords Clustering to Construct Ontological Hierarchies
704
Using k-harmonic means clustering for the initialization of the clustering method based on one-class support vector machines
705
Using KIDS as a tool support for VDM
706
Using kinect for assesing the state of Multiple Sclerosis patients
707
Using Kinect for face recognition under varying poses, expressions, illumination and disguise
708
Using Kinect for hand tracking and rendering in wearable haptics
709
Using Kinect for upper-limb functional evaluation in home rehabilitation: A comparison with a 3D stereoscopic passive marker system
710
Using Kinect in teaching children with hearing and visual impairment
711
Using Kinect to Develop a Smart Meeting Room
712
Using KINECT to measure joint movement for standing up and sitting down
713
Using kinematic clones to control the dynamic simulation of articulated figures
714
Using kinematic ranging to support the tracker
715
Using Kinesthetic and Tactile Cues to Maintain Exercise Intensity
716
Using kinesthetic input to overcome obstacles with snake robots
717
Using k-Interactive Measure in Optimization-Based Data Mining
718
Using KIV to specify and verify architectures of knowledge-based systems
719
Using Kiva.org to develop critical student employability skills
720
Using KL-divergence and multilingual information to improve ASR for under-resourced languages
721
Using K-Means and morphological segmentation for intertidal flats recognition
722
Using K-means cluster based techniques in external plagiarism detection
723
Using K-Means Clustering and Parameter Weighting for Partial-Discharge Noise Suppression
724
Using k-means clustering method in determination of the optimal placement of distributed generation sources in electrical distribution systems
725
Using K-Means Clustering Technique to Study of Breast Cancer
726
Using k-means clustering to identify time-of-day break points for traffic signal timing plans
727
Using k-means clustering to improve traffic signal efficacy in an IntelliDriveSM environment
728
Using k-means clustering with transfer and Q learning for spectrum, load and energy optimization in opportunistic mobile broadband networks
729
Using k-means for clustering in complex automotive production systems to support a Q-learning-system
730
Using KML and Virtual Globes to Access and Visualize Heterogeneous Datasets and Explore Their Relationships Along the A-Train Tracks
731
Using K-nearest neighbor algorithm to reduce false negatives in P2P secure routing protocols
732
Using k-Nearest Neighbor and Speaker Ranking for Phoneme Prediction
733
Using k-nearest neighbor method to identify poison message failure
734
Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade
735
Using knowledge about the road network for route finding
736
Using knowledge anchors to reduce cognitive overhead
737
Using Knowledge and Rule Induction Methods for Enhancing Clinical Diagnosis: Success Stories
738
Using Knowledge Awareness Support Learning Services Providing in e-Learning Environment
739
Using Knowledge Base and DSS to Fill the Gaps in Agile Methodologies for Managing Project Life Cycles
740
Using knowledge building to support deep learning, collaboration and innovation in engineering education
741
Using knowledge discovery for autonomous decision making in smart grid nodes
742
Using knowledge discovery techniques for database schema refinement
743
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies
744
Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China
745
Using Knowledge Management in DMAIC methodology of Six Sigma projects
746
Using knowledge management method to improve machine automation system in IC fab
747
Using Knowledge Management Systems to Structure Knowledgeable Practices
748
Using Knowledge Management Techniques to Improve the Learning Process through the Exchange of Knowledge Chains
749
Using Knowledge Management Technologies in Searching Medicinal Learning Objects
750
Using Knowledge Management Technologies to Develop Reflective Learning
751
Using Knowledge Management to Create Self-Reliant Communities in Thailand
752
Using knowledge management to enable enterprise asset management at Conectiv
753
Using Knowledge Management to Enhance Enterprises Innovation Capability in E-Commerce
754
Using knowledge management to improve software process performance in a CMM level 3 organization
755
Using knowledge of the region of interest (ROI) in automatic image retrieval learning
756
Using knowledge representation for agent world model
757
Using knowledge representation to understand interactive systems
758
Using Knowledge Space theory to Personalize Teaching for Groups of Students
759
Using knowledge-based evolutionary computation to solve nonlinear constraint optimization problems: a cultural algorithm approach
760
Using knowledge-based system kernels to improve quality
761
Using knowledge-based system with hierarchical architecture to guide the search of evolutionary computation
762
Using knowledge-based systems for entrepreneurial new venture analysis
763
Using knowledge-based systems for software project planning
764
Using knowledge-based systems to support learning of organizational knowledge: a case study
765
Using knowledge-based systems with CAD
766
Using knowledge-based technology to integrate CIM databases
767
Using knowledge-based transformations to reverse-engineer COBOL programs
768
Using Known Base Vector Length as Quasi-Observation to Improve GPS Ambiguity Resolution
769
Using Kohonen Feature Maps To Monitor The Condition Of Synchronous Generators
770
Using Kohonen map for the placement of regular VLSI designs
771
Using Kohonen Maps and Singular Value Decomposition for Plagiarism Detection
772
Using Kohonen self organising feature maps for the analysis of ambulatory oesophageal manometry
773
Using Kolmogorov complexity for understanding some limitations on steganography
774
Using Kolmogorov-Smirnov Tests to Detect Track-Loss in the Absence of Truth Data
775
Using KORBX for military airlift applications
776
Using KPCA feature selection and fusion for intrusion detection
777
Using k-Poselets for Detecting People and Localizing Their Keypoints
778
Using k-Pricing for Penalty Calculation in Grid Market
779
Using KrF laser to induce photomodification of hollow metal nanoparticles for optical data storage
780
Using Kriging to interpolate MRI data
781
Using Kullback-Leibler Divergence Language Models to Find Experts in Enterprise Corpora
782
Using lab experiments in electric circuits to promote achievements in mathematics
783
Using labeled and unlabeled documents to improving SVM classifier via EM
784
Using Labeled Hyper Multi Digraph for Tabriz Passenger Traffic Modeling: Data-oriented Approach
785
Using Labeled Transition System Model in Software Access Control Politics Testing
786
Using laboratory to improve understanding of 802.3 physical characteristics
787
Using laboratory X-ray and cobalt-60 irradiations to predict CMOS device response in strategic and space environments
788
Using LabVIEW for building laboratory server: Pros and cons, design patterns, software architecturing and common pitfalls
789
Using LabVIEW remote panel in remote laboratories: Advantages and disadvantages
790
Using LabVIEW software for a fire and alarm technology lab
791
Using LabVIEW to measure transformer residual flux for inrush current reduction
792
Using LabVIEW to prototype an industrial-quality real-time solution for the Titan outdoor 4WD mobile robot controller
793
Using LabVIEW to provide rapid prototyping environment for the teaching of avionics systems
794
Using lacunarity index and wavelet analysis to characterize scale-dependent landscape heterogeneity of Hotan Oasis in China
795
Using Lagrange´s interpolation formula to construct Reed-Solomon codes over GF(p)
796
Using Lagrangean Relaxation for Service Location Planning with QoS Constraints in Large-Scale Networks
797
Using Lagrangian Relaxation Decomposition With Heuristic to Integrate the Decisions of Cell Formation and Parts Scheduling Considering Intercell Moves
798
Using Lagrangian Relaxation for Radio Resource Allocation in High Altitude Platforms
799
Using Laguerre expansion within point-process models of heartbeat dynamics: A comparative study
800
Using Laguerre functions to improve efficiency of multi-parametric predictive control
801
Using Lambda Networks to Enhance Performance of Interactive Large Simulations
802
Using Laminated Metal Tooling (LMT) in die manufacturing for clay moulding
803
Using Lamport clocks to reason about relaxed memory models
804
Using LAN and wireless technology to setup a dynamic local power dispatch system
805
Using Lanchester Combat Models to aid battlefield visualization
806
Using landsat data to detect long-term morphodynamic behavior of estuaries: A case study in the Xiaoqing River estuary, China
807
Using landsat images for urban change detection, a case study in Algiers town
808
Using landsat thematic mapper data to analyze thermal properties of forests
809
Using Landsat TM data to aid the assessment of long-term trends in lake water quality in New Hampshire lakes
810
Using Landsat/TM Imagery to Estimate Nitrogen and Phosphorus Concentration in Taihu Lake, China
811
Using lane tracker data to improve lane-level digital maps created with probe vehicle data
812
Using language and students´ relationship to authority to understand the learning process
813
Using language more responsibly
814
Using language rules to improve the performance of word segmentation
815
Using Language Technologies to Diagnose Learner´s Conceptual Development
816
Using Language to Drive the Perceptual Grouping of Local Image Features
817
Using Language to Learn Structured Appearance Models for Image Annotation
818
Using languages for capture, analysis and display of performance information for parallel and distributed applications
819
Using Laplace transforms to compute performance of mobile radio links
820
Using Laplace´s equation for defining magnetizing current densities for 3D analysis with edge elements
821
Using Laplacian Spectra to Analyze Project Based Services
822
Using Larch to specify Avalon/C++ objects
823
Using Large Aperture Scintillometer to validate pixel heat flux based on remote sensing models
824
Using Large Arrays for SNR Improvement on Receiver Limited MRI Systems
825
Using large color LBP in generalized hough transform
826
Using Large Databases and Self-Organizing Maps without tears
827
Using Large Scale Aggregated Knowledge for Social Media Location Discovery
828
Using Large Signal Code TESLA for Wide Band Klystron Simulations
829
Using large-eddy simulation to investigate intermittency fluxes of clear-air radar reflectivity in the atmospheric boundary layer
830
Using large-scale local and cross-location experiments for smart grid system validation
831
Using Laser and Vision to Locate a Robot in an Industrial Environment: A Practical Experience
832
Using laser defect avoidance to build large-area FPGAs
833
Using laser direct-write to precisely pattern cells on glass cover slips
834
Using laser echo recovery and a scannable field-of-view telescope to determine vegetation structure and sub-canopy topography over wide swaths
835
Using laser induced breakdown spectroscopy to analyse the chromium in soil for a different spectrum line
836
Using laser induced surface acoustic waves to characterize thin films and material surfaces
837
Using laser line scan imaging technology to assess deepwater seafloor habitats in the Monterey Bay National Marine Sanctuary
838
Using laser range data for 3D SLAM in outdoor environments
839
Using laser range data to model tunnel curvature for the automatic guidance of a mining vehicle
840
Using laser scanners for modeling and analysis in architecture, engineering, and construction
841
Using laser spectroscopy to study the non-maxwellian statistics of trapped ions
842
Using latent attractors to discern temporal order
843
Using Latent Dirichlet Allocation for automatic categorization of software
844
Using latent dirichlet allocation for topic modelling in twitter
845
Using latent features to measure the diversity of recommendation lists
846
Using Latent Semantic Analysis for automated grading programming assignments
847
Using latent semantic analysis to identify similarities in source code to support program understanding
848
Using latent topic features to improve binary classification of spoken documents
849
Using lateral length measurements in GMTI convoy tracking
850
Using lattice approach to scan nonlinear resonance region
851
Using lattice in windowed multimodulus algorithm for blind equalization
852
Using lattice rules for variance reduction in simulation
853
Using Launch-on-Capture for Testing BIST Designs Containing Synchronous and Asynchronous Clock Domains
854
Using Launch-on-Capture for Testing Scan Designs Containing Synchronous and Asynchronous Clock Domains
855
Using Layered Bottlenecks for Virtual Machine Provisioning in the Clouds
856
Using layout data for predicting effects on production processes in PCB-manufacturing
857
Using layout technique and direct-tunneling mechanism to promote DC performance of partially depleted SOI devices
858
Using L-band SAR images to map coastal wetlands
859
Using LBG algorithm for extracting the features of EMG signals
860
Using LBP histogram for face recognition on Android platform
861
Using LBS to construct an e-learning environment
862
Using LCDF-TEQ to Reduce CP Length for 20.48-Gb/s Direct Detection Optical OFDM Systems Over 1200 km of SMF
863
Using LCSS algorithm for circuit level verification of analog designs
864
Using LDA and Ant Colony Algorithm for Spam Mail Filtering
865
Using LDAP as a Management Solution for Distributed OSGi
866
Using LDPC codes to enhance the performance of FM-DCSK
867
Using LDPC-Coded Modulation and Coherent Detection for Ultra Highspeed Optical Transmission
868
Using lead vehicle response to generate preview functions for active suspension of convoy vehicles
869
Using leader-based communication to improve the scalability of single-round group membership algorithms
870
Using learned affordances for robotic behavior development
871
Using learned visual landmarks for intelligent topological navigation of mobile robots
872
Using Learners´ Annotations to Produce Feedbacks for Selecting and Editing Learning Contents in e-Learning Systems
873
Using Learning Algorithms to Improve Corner Detection
874
Using Learning Analytics Technologies to Find Learning Structures from Online Examination System
875
Using learning and searching approach to explain neural network with distributed representations
876
Using learning automata for adaptive push-based data broadcasting in asymmetric wireless environments
877
Using learning automata for adaptively adjusting the downlink-to-uplink ratio in IEEE 802.16e wireless networks
878
Using learning automata for tuning fuzzy membership functions in learning driver preferences
879
Using Learning Automata in Cooperation among Agents in a Team
880
Using Learning Automata to Model a Domain in a Tutorial-Like System
881
Using learning automata to model a student-classroom interaction in a tutorial-like system
882
Using learning automata to model the “learning process” of the teacher in a tutorial-like system
883
Using learning automata to model the behavior of a teacher in a tutorial-like system
884
Using learning classification and four-dimensional parametric modeling for the analysis of myocardial thickening
885
Using learning classifier systems to design selective hyper-heuristics for constraint satisfaction problems
886
Using Learning Classifier Systems to Learn Stochastic Decision Policies
887
Using learning classifier to recognize face image
888
Using learning communities to teach technical communication in accounting
889
Using learning content management systems as highly adaptive and efficient supporting tool for (recurrent) training — an applied perspective
890
Using learning contracts for improved teaching and student involvement
891
Using learning design to deploy and administer engineering courses
892
Using learning object technology to tackle the education challenges of the Caribbean
893
Using Learning Objects to Affect Educational Outcomes
894
Using Learning Portfolio Platform to Enhance Altruistic Behaviors
895
Using learning response systems in higher education
896
Using learning samples to construct fuzzy logic systems with the application to inverted pendulum control
897
Using Learning Style Theory in Remote Laboratory Applications
898
Using learning style theory to improve learning and teaching in the engineering classroom
899
Using Learning Styles and Preferences to Incorporate Emerging E-Learning Tools in Teaching
900
Using learning styles in software documentation
901
Using learning styles preferences data to inform classroom teaching and assessment activities
902
Using Learning Styles to Implementing Personalized e-Learning System
903
Using learning techniques to accommodate unanticipated faults
904
Using learning through play strategies for RADAR RADAR technology, a game for learning RADAR fundamentals
905
Using learning vector quantizers for network bandwidth optimization in the QCELP speech coder
906
Using leases to support server-driven consistency in large-scale systems
907
Using least mean square learning error to improve Takagi-Sugeno type fuzzy logic controller optimization
908
Using least square support vector machine for reducing the cross-sensitivity of sensors
909
Using least squares support vector machines in short-term electrical load forecasting
910
Using least squares to improve blind signal copy performance
911
Using least-square Monte Carlo simulation to price American multi underlying stock options
912
Using Least-Square Policy Iteration to Online Optimize the Parameters of ALV´s Speed Controller
913
Using LED Lighting for Ubiquitous Indoor Wireless Networking
914
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification
915
Using LEGO Mindstorms in the undergraduate curriculum of IT
916
Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course
917
Using LEGO mindstorms to engage students on algorithm design
918
Using LEGO NXT Mobile Robots With LabVIEW for Undergraduate Courses on Mechatronics
919
Using LEGO robots with LabVIEW for a Summer School on Mechatronics
920
Using Legos and RoboLab (LabVIEW) with elementary school children
921
Using legos to interest high school students and imtrove k12 stem education
922
Using Length-weighted Once Kernel to Detect Anomalous Process
923
Using LEO-GEO cross-link to enhance LEO satellite communication coverage area
924
Using level restoring method for dual supply voltage
925
Using Level Restoring Method for Dual Supply Voltage
926
Using lexical and contextual constraints in language understanding
927
Using lexical knowledge for the recognition of poorly written words
928
Using lexical similarity in handwritten word recognition
929
Using lexical stress in continuous speech recognition for Dutch
930
Using lexical, syntactic and semantic features for non-terminal grammar rule induction in Spoken Dialogue Systems
931
Using lexicographic preorder for pareto search in QoS-aware web service composition
932
Using Lexicographical Method to Achieve Network Lifetime Maximization in Wireless Sensor Networks
933
Using lexicometry and vocabulary analysis techniques to detect a signature for web profile
934
Using libNetVirt to control the virtual network
935
Using libPcap for monitoring distributed applications
936
Using Lid of pins for packaging of microstrip board for descrambling the ports of eleven antenna for radio telescope applications
937
Using LiDAR Data Visualization to Investigate Origin of Uphill-Facing Scarps in Mountains, Alaska
938
Using LIDAR doppler velocity data and chaotic oscillatory-based neural network for the forecast of meso-scale wind field
939
Using LIDAR Surface Deformation Mapping to Constrain Earthquake Magnitudes on the Seattle Fault in Washington State, USA
940
Using lidar to estimate the capacity for storm water recycling and solar energy collection
941
Using lidar waveforms to detect environmental hazards through visualization of the water column
942
Using LIDO to handle 3D cultural heritage documentation data provenance
943
Using Lie algebra for shape estimation of medical snake robots
944
Using life course theory to frame women and girls´ trajectories toward (or away) from computing: Pre high-school through college years
945
Using Life Cycle Assessment on environmental management projects: a case study of a Brazilian vehicle development
946
Using life-cycle information for reliability assessment of electronic assemblies
947
Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance
948
Using lifting wavelet to segment moving objects from videos
949
Using Light-Emitting Diodes for intersatellite links
950
Using light-weight groups to handle timing failures in quasi-synchronous systems
951
Using Lightweight Transactions and Snapshots for Fault-Tolerant Services Based on Shared Storage Bricks
952
Using lightweight virtual machines to achieve resource adaptation in middleware
953
Using Lightweight Virtual Machines to Run High Performance Computing Applications: The Case of the Weather Research and Forecasting Model
954
Using lignite as carbon source for solid phase denitrification of nitrate polluted groundwater
955
Using likelihood L-statistics to measure confidence in audio-visual speech recognition
956
Using likely program invariants to detect hardware errors
957
Using Limited Dependence Sequential Expansion for Decompressing Test Vectors
958
Using Limited Feedback in Power Allocation Design for a Two-Hop Relay OFDM System
959
Using Limited Observations to Inverse Dynamically Groundwater Spatial Distribution: A Case Study from the Lower Reaches of Tarim River, China
960
Using Linda for supercomputing on a local area network
961
Using Line and Ellipse Features for Rectification of Broadcast Hockey Video
962
Using Line and Texture to Visualize Higher-Order Voronoi Diagrams
963
Using line consistency to estimate 3D indoor Manhattan scene layout from a single image
964
Using Line Features In Incremental Depth Estimation
965
Using line integral convolution for flow visualization: curvilinear grids, variable-speed animation, and unsteady flows
966
Using line segments as structuring elements for sampling-invariant measurements
967
Using linear and nonlinear decompositions in state-space for calculating minimal dimension embedding of chaotic attractor
968
Using linear and nonlinear predictors to improve the computational efficiency of the FD-TD algorithm
969
Using Linear Block Code and Concatenated Code to Build (k,n) Threshold Scheme
970
Using linear cellular automata with memory layer in BIST
971
Using Linear Congruential Generators For Parallel Random Number Generation
972
Using linear discriminant analysis and data mining approaches to identify E-commerce anomaly
973
Using Linear Discriminant Analysis to Fuse Bimodal Biometrics Traits in Complex Space
974
Using linear discriminant function to detect eyes closing activities through alpha wave
975
Using linear interpolation and Kalman prediction in Pattern Recognition: Application to an induction machine
976
Using linear interpolation method for packet drop probability function of RED algorithm
977
Using linear landmarks for path planning with uncertainty in outdoor environments
978
Using linear matrix inequality for the guaranteed cost control with arbitrary rank uncertainty matrices
979
Using Linear Model Predictive Control via Feedback Linearization for dynamic encirclement
980
Using linear models of speech trajectory in the reconstructed phase space to extract useful features for speech recognition system
981
Using linear optimization and swarm intelligent heuristic to find a route for MANET
982
Using linear prediction to design a function elimination filter to reject sinusoidal interference
983
Using linear prediction to enhance the tracking of partials [musical audio processing]
984
Using linear programming models for minimizing harmonics values in cascaded multilevel inverters
985
Using linear programming to Decode Binary linear codes
986
Using Linear Regression Analysis for Face Recognition Based on PCA and LDA
987
Using linear regression residual of document vectors in text categorization
988
Using linear regression to characterize data coherency traffic
989
Using Linear Relations Between Experimental Characteristics in Stiff Identification Problems of Linear Circuit Theory
990
Using linear smoothing to improve the modulation recognition performance
991
Using Linear Support Vector Machines to Solve the Asymmetric Comparison-Based Fault Diagnosis Problem
992
Using linear system reliability to obtain theoretical understanding of wireless routing
993
Using linear temporal model checking for goal-oriented policy refinement frameworks
994
Using linear time-invariant system theory to estimate kinetic parameters directly from projection measurements
995
Using linear time-invariant system theory to estimate kinetic parameters directly from projection measurements
996
Using Linearization for Global Consistency in SSR
997
Using linearly-constrained adaptive beamforming to reduce interference in hearing aids from competing talkers in reverberant rooms
998
Using line-length effects to optimize circuit-level reliability
999
Using lines of arbitrary impedance as standards on the TRL calibration technique
1000
Using Linguistic Data Summarization in the study of creep data for the design of new steels
بازگشت