<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using symbolic execution to aid automatic test data generation
2
Using symbolic feasibility tests during design space exploration of heterogeneous multi-processor systems
3
Using Symbolic Modeling in Business Re-Engineering
4
Using symbolic Rademacher-Walsh spectral transforms to evaluate the agreement between Boolean functions
5
Using symbolic Rademacher-Walsh spectral transforms to evaluate the correlation between Boolean functions
6
Using symbolic techniques to find the maximum clique in very large sparse graphs
7
Using Symlet Decomposition Method, Fuzzy Integral and Fisherface Algorithm for Face Recognition
8
Using symmetric state transformations for multi-target tracking
9
Using symmetrical components for internal external fault discrimination in differential protection schemes
10
Using symmetrical regions of interest to improve visual SLAM
11
Using symmetries and equivalent moments in improving the efficiency of the subdomain multilevel approach
12
Using Symmetries For Analysis Of Shape From Contour
13
Using Symmetry Dicke State as Security Detection Particle in Quantum "Ping-Pong" Protocol
14
Using Symmetry to Select Fixation Points for Segmentation
15
Using synchronism pulse to improve A2I implementations
16
Using synchronization bits to boost compression by substring enumeration
17
Using synchronization stalls in power-aware accelerators
18
Using synchronized atoms to check distributed programs
19
Using synchronized wide area measurements for response-based switched reactive controls
20
Using Synchronizers for Refining Synchronous Communication onto Hardware/Software Architectures
21
Using synchronous and asynchronous online learning in computer science courses
22
Using synchronous rectification for medium voltage applications
23
Using synchronverters for power grid stabilization
24
Using synchrophasor for fault location identification
25
Using synchrophasors for controlled islanding - A prospective application for the Uruguayan power system
26
Using synchrophasors for controlled islanding - a prospective application for the Uruguayan power system
27
Using syndrome compression for memory built-in self-diagnosis
28
Using synergies in dual-arm manipulation tasks
29
Using syntactic and confusion network structure for out-of-vocabulary word detection
30
Using syntactic information to improve large-vocabulary word recognition
31
Using syntactic parsing for geographical names extraction on the example of newspaper articles
32
Using synthesis, simulation, and hardware emulation to prototype a pipelined RISC computer system
33
Using synthetic aperture sonar as an effective hydrographic survey tool
34
Using synthetic aperture sonar as an effective tool for pipeline inspection survey projects
35
Using synthetic aperture sonar in marine archaeological surveys - Some first experiences
36
Using Synthetic Data to Train an Accurate Real-World Fault Detection System
37
Using synthetic M-mode imaging to measure temporal differences in left ventricular contraction patterns during ischemia
38
Using Synthetic Variable ratio Method to Fuse Multi-source Remotely Sensed Images Based on Sensor Spectral Response
39
Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs
40
Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience
41
Using SysML for Smart Surface Modeling
42
Using SysML in Systems Design
43
Using Sysml to Describe a New Methodology for Semiautomatic Software Generation from Inferred Behavioral and Data Models
44
Using SysML to model complex systems for security
45
Using system call information to reveal hidden attack manifestations
46
Using System Disturbance Measurement Data to Develop Improved Load Models
47
Using System Dynamics Analysis for Performance Evaluation of IoT Enabled One-Stop Logistic Services
48
Using system dynamics approach to analyze the impact of carbon tax on photovoltaic systems installation and electricity costs
49
Using System Dynamics as a Knowledge-Based Decision Making Paradigm
50
Using system dynamics for safety and risk management in complex engineering systems
51
Using system dynamics for short life cycle supply chains evaluation
52
Using system dynamics modeling to manage projects
53
Using System Dynamics Simulations to Compare Capacity Models for Production Planning
54
Using System Dynamics to Integrate Spatial-Temporal Model in Taiwan Coastal Zone
55
Using system dynamics to model the social care system: Simulation modeling as the catalyst in linking demography to care delivery
56
Using system dynamics to model the transition to biofuels in the United States
57
Using system dynamics to simulate the strategic planning of the mobile commerce terminal (MCT) industry and mobile commerce diffusion
58
Using System Identification to Improve the Performance of a Low-Cost Flight Simulator
59
Using system identification to model the transmission of vibroarthrographic signals
60
Using system reliability to determine supportability turnaround time at a repair depot
61
Using system state information for adaptive state polling policy in distributed load balancing
62
Using system thinking to investigate co-opetition analysis for manufacturers in the cloud industry
63
Using SystemC AMS for heterogeneous systems modelling at TIER-1 level
64
Using SystemC for an extended MATLAB/Simulink verification flow
65
Using system-level models to evaluate I/O subsystem designs
66
Using System-on-a-Chip as a vehicle for VLSI design education
67
Using systems analysis techniques in the development of standards and procedures
68
Using systems biology approaches to study a multidrug resistance network
69
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
70
Using systems engineering for a requirement-based design support for autonomous robots
71
Using systems engineering for improving autonomous robot performance
72
Using Systems Practice to enable quality in design
73
Using SystemVerilog assertions to relate non-cycle-accurate to cycle-accurate designs
74
Using SystemVue to extend VNA´s application to EVM measurement
75
Using t e Fault Current Limiter wit Transformer Type Reactor to Reduce S ort Circuit Currents
76
Using T.38 and SIP for real-time fax transmission over IP networks
77
Using Tableaux Method to Represent Inconsistent Knowledge of Deep Web
78
Using Tablet PCs and Interactive Software in IC Design Courses to Improve Learning
79
Using tablet PCs and interactive software in integrated-circuit-design courses to improve learning
80
Using tablets and satellite-based internet to deliver numeracy education to marginalized children in a developing country
81
Using tablets in the vision-based control of a ball and beam test-bed
82
Using Tabu Search for optimization of memory-constrained hybrid BIST
83
Using tabu search for segmentation of cursive handwriting
84
Using tabu search to find optimal switched LAN configurations
85
Using Tabu search with multi-neighborhood structures to solve University Course Timetable UKM case study (faculty of engineering)
86
Using Tabu-Voronoi clustering heuristics with key management scheme for heterogeneous sensor networks
87
Using tacit knowledge in organizational change: A case study of the Swedish model of management in Singapore
88
Using TACS Functions Within EMTP to Set Up Current-Transformer Model Based on the Jiles–Atherton Theory of Ferromagnetic Hysteresis
89
Using TACS functions within EMTP to teach protective relaying fundamentals
90
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance
91
Using tactical intelligence to help inform strategy
92
Using Tactic-Based Learning (formerly Mentoring) to Accelerate Recovery of an Adaptive Learning System in a Changing Environment
93
Using tactile and visual sensing with a robotic hand
94
Using tactile displays to maintain situational awareness during driving
95
Using tactile information in telerobotics
96
Using tactile sensation for learning contact knowledge: Discriminate collision from physical interaction
97
Using tactile sensors to estimate care receiver position on dual arms of robot
98
Using tactile whiskers to measure surface contours
99
Using tag clouds to support the comparison of qualifications, Résumés and job profiles
100
Using Tag Co-occurrence for Recommendation
101
Using tag similarity in SVD-based recommendation systems
102
Using tag to help keyword extraction
103
Using tagged MRI to reconstruct a 3D heartbeat
104
Using tagging in social networks to find groups of compatible users
105
Using tagging to identify and organize concerns during pre-requirements analysis
106
Using tag-match comparators for detecting soft errors
107
Using Tag-Neighbors for Query Expansion in Medical Information Retrieval
108
Using tags for breaking news elicitation
109
Using Tags to Construct the Digital Resource Management System
110
Using Taguchi methods to train artificial neural networks in pattern recognition, control and evolutionary applications
111
Using Taguchi´s method of experimental design to control errors in layered perceptrons
112
Using Taint Analysis for Threat Risk of Cloud Applications
113
Using Takagi-Sugeno-Kang approximation fuzzy logic for evaluating the performance of color difference formulas in dentistry
114
Using Talbot lattices for quantum state manipulation
115
Using talker location to detect spurious utterances in desktop command and control
116
Using talking heads for real-time virtual videophone in wireless networks
117
Using tamped exploding wires to generate strongly coupled plasmas
118
Using tangent balls to find plane sections of natural quadrics
119
Using tangent vectors and eigenvectors in power system voltage collapse analysis
120
Using Tangible Learning Companions in English Education
121
Using tapers for efficient coupling of received FSO-signals into fibres
122
Using tapped delay line to improve the precision of an ensemble of classifiers in device-free localization
123
Using Tapped-Inductor Converters as LED Drivers
124
Using target faults to achieve a minimized partial scan path
125
Using target faults to detect non-target defects
126
Using target radial length for data association in multiple-target tracking
127
Using target RCS to aid measurement-to-track association in multi-target tracking
128
Using Target RCS when Tracking Multiple Rayleigh Targets
129
Using target variance for optimum zoom setting in ATR
130
Using Target´s Polarization for Data Association in Multiple Target Tracking
131
Using targeted statistics for face regeneration
132
Using targets appearance to improve pedestrian classification with a laser scanner
133
Using Task Analysis to Improve the Requirements Elicitation in Health Information System
134
Using task analytic models to visualize model checker counterexamples
135
Using task descriptions for designing optimal task specific manipulators
136
Using Task-Based Dialogues for Multi-agent Collaborations
137
Using Task-oriented Requirements Engineering in Different Domains Experiences with Application in Research and Industry
138
Using task-quotient/sup /spl copy// (TQ) to maximize individual motivation & job satisfaction
139
Using Tasks and Semi-structured Messages to Support Decision Follow Up
140
Using Tasks for Analgsis and Design in Writing Manuals: A Review
141
Using tasks for improving the presentations for database query results
142
Using Tasseled Cap Transformation and Finite Gaussian Mixture Model to Classify Landsat TM Imagery Data
143
Using Tasseled Cap Transformation of CBERS-02 Images to Detect Dieback or Dead Robinia Pseudoacacia Plantation
144
Using tasseled cap transformation of HJ-1B CCD2 image to extract Gaoantun landfill of Beijing, China
145
Using Taxonomies to Perform Aggregated Querying over Imprecise Data
146
Using Taylor predictor to improve stabilization of steady state in third-order chaotic system
147
Using TCAD for fast analysis of misprocessed wafers and yield excursions
148
Using TCAD, Response Surface Model and Monte Carlo Methods to Model Processes and Reduce Device Variation
149
Using TCAM efficiently for IP route lookup
150
Using TCAS surveillance to enable legacy ADS-B transponder use for in-trail procedures
151
Using TCAS surveillance to enable legacy ADS-B transponder use for in-trail procedures
152
Using TCBF technique to realize elephant flows identification
153
Using T-codes as locally decodable source codes
154
Using TCOZ for modeling Web caching
155
Using TCP congestion control to improve the performances of optical burst switched networks
156
Using TCP flow-aggregation to enhance data experience of cellular wireless users
157
Using TCP models to understand bandwidth assurance in a Differentiated Services network
158
Using TCP-feedback to Optimize Transcoding Performance
159
Using TCSC scheme for SSR mitigation in a radial transfer corridor
160
Using TDD for developing object-oriented software — A case study
161
Using TD-GC-MS to analyze coffee beans aromas of different roast levels
162
Using TEALE learning methodology to promote portable interdisciplinary accountability in engineering education
163
Using team based process as an educational medium for an undergraduate production and operations management course
164
Using Team Reporting Projects to Teach Concepts of Audience and Written, Oral, and Interpersonal Communication Skills
165
Using team reporting projects to teach concepts of audience and written, oral, and interpersonal communication skills
166
Using Teams, Peer- and Self Evaluation in Blended Learning Classes
167
Using technical art, an industry guide-George A. Magnan
168
Using technical debt data in decision making: Potential decision approaches
169
Using technical documents as support for developing competences in HW/SW design
170
Using technical specifications for water cooled generator stator rewinds
171
Using technologies to change the ‘learning landscape’ in healthcare practice: The case of the NHS in England
172
Using technology and innovation to simulate daily life
173
Using technology for stakeholder consultation. The World Bank´s use of GroupSystems V in developing countries
174
Using Technology in Autism Research: The Promise and the Perils
175
Using technology in livings labs to transform access to healthcare information in South Africa
176
Using technology to enhance creative actions in decision making
177
Using technology to enhance outcome assessment in engineering education
178
Using technology to improve peer review and collaborative conversations to benchmark academic standards
179
Using technology to improve the quality of classroom instruction
180
Using technology to make farming easier and better: Simplified E-Farming Support (SEFS)
181
Using Technology to Support Self-Regulation in University Writing
182
Using technology to support the provision of care services
183
Using technology to tailor electronic information to users
184
Using technology-based teaching approaches to facilitate the curriculum of “Information and Law”: STS-TAM conceptual framework
185
Using telecommunication traffic parameters in social network approaches
186
Using Telecommunications Middleware to Dynamically Adapt Multimedia Services
187
Using Teledomotis interface for a new multiservice network applied to monitoring the elderly
188
Using telehealth technology to improve the delivery of health services to people who are deaf
189
Using tele-medical electrocardiography monitoring and analysis for a more immediate prognosis to patients of suspect Long QT Syndrome
190
Using telemetry to measure equipment usable life on the NASA Orion spacecraft
191
Using Telerobotic Operations to Increase EVA Effectiveness: Aerobrake Assembly Neutral Buoyancy Testing
192
Using Tele-robotic Skull Drill for Neurosurgical Applications
193
Using TEM Cell Measurements to Estimate the Maximum Radiation From PCBs With Cables Due to Magnetic Field Coupling
194
Using TEM cells for shielding performance evaluation
195
Using TEM waveguides according to the new IEC 61000-4-20
196
Using temperature / vegetation index to assess surface soil moisture status
197
Using Temperature as Observable of the Frequency Response of RF CMOS Amplifiers
198
Using temperature effects on polymer-composite sensor arrays to identify analytes
199
Using temperature, voltage, and/or speed measurements to improve trending of induction motor RMS currents in process control and diagnostics
200
Using template matching for object recognition in infrared video sequences
201
Using template matching for object recognition in infrared video sequences
202
Using Template Metaprogramming to Enhance Reuse in Visitor-Based Model Interpreters
203
Using template NAMAS procedures to provide quality calibration
204
Using template-based passwords for authentication in e-banking
205
Using Templates to Predict Execution Time of Scientific Workflow Applications in the Grid
206
Using Temporal Abduction for Biosignal Interpretation: A Case Study on QRS Detection
207
Using temporal abstractions and cancellations for efficiency in automated meeting scheduling
208
Using temporal averaging to decouple annual and nonannual information in AVHRR NDVI time series
209
Using temporal binding for connectionist recruitment learning over delayed lines
210
Using temporal causal models to isolate failures in Power System protection devices
211
Using temporal causal models to isolate failures in power system protection devices
212
Using temporal coherence to build models of animals
213
Using temporal constraints for eliminating crosstalk candidates for design and test
214
Using temporal correlation and time series to detect missing activity-driven sensor events
215
Using temporal correlation for fast and highdetailed video tone mapping
216
Using temporal information distance to locate sensorimotor experience in a metric space
217
Using temporal information for improving articulatory-acoustic feature classification
218
Using temporal information in an automated classification of summer, marginal ice zone imagery
219
Using temporal information in input features of neural networks
220
Using Temporal Information to Improve Predictive Accuracy of Collaborative Filtering Algorithms
221
Using temporal integration for tracking regions in traffic monitoring sequences
222
Using Temporal Logic and Model Checking in Automated Recognition of Human Activities for Ambient-Assisted Living
223
Using Temporal Logic for Spatial Reasoning: Spatial Propositional Neighborhood Logic
224
Using temporal logic to specify and verify cryptographic protocols
225
Using temporal logics for modeling and analysis of workflows
226
Using temporal logics for planning and control
227
Using temporal logics of knowledge in the formal verification of security protocols
228
Using temporal neural networks to forecasting of broadband network faults
229
Using temporal-domain peak interval determination for video-based short-term heart rate measurement
230
Using Temporary Properties to Provide Leasing Functionality in CORBA
231
Using tensor properties of four wave mixing in semiconductor optical amplifiers for polarization independent wavelength conversion or pump suppression
232
Using tensors to track earthquakes on hydraulic shaker tables
233
Using tentative decisions for carrier phase recovery of turbo-coded transmissions
234
Using terahertz cascade lasers for determination of optical losses in active medium of silicon intracenter lasers
235
Using terahertz pulsed imaging (TPI) to identify colonic pathology.
236
Using Terahertz Pulsed Imaging to Measure Enamel Demineralisation in Teeth
237
Using terahertz time-domain spectroscopy to determine the glass transition temperature of heavy oils
238
Using terahertz time-domain spectroscopy to identify pharmaceutical cocrystals
239
Using terahertz time-domain-spectroscopy to follow the kinetics and mechanism of cocrystal formation
240
Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence
241
Using Term Relation in Context Sensitive Information Retrieval
242
Using term rewriting systems to design and verify processors
243
Using term rewriting to verify software
244
Using Termination Effect to Characterize Electric and Magnetic Field Coupling Between TEM Cell and Microstrip Line
245
Using terrain information in an electrification planning tool
246
Using TerraSAR-X SAR interferometric data to derive maps of the atmospheric phase delay
247
Using tertiary storage in video-on-demand servers
248
Using Test and Diagnosis to Enable Tomorrow´s Robust Systems
249
Using Test Cases to Size Systems: A Case Study
250
Using test data to improve IC quality and yield
251
Using test data to predict avionics integrity
252
Using test infrastructures for (remote) online evaluation of the sensitivity to SEUs of FPGAs
253
Using test oracles generated from program documentation
254
Using test structures to assess the impact of critical process steps on MOS transistor matching
255
Using Testability Measures for Dependability Assessment
256
Using testbeds for optically-transparent mesh network experimentation
257
Using Test-Driven Software Development Tools
258
Using Tester Repeatability to Improve Yields
259
Using testing trace for automatic user categorization
260
Using Tests to Select Engineers
261
Using Text Analysis to Understand the Structure and Dynamics of the World Wide Web as a Multi-Relational Graph
262
Using text as a meander line for RFID transponder antennas
263
Using Text Categorization to Find Job Opportunities
264
Using text corpora for understanding polysemy in Bangla
265
Using text mining and chance discovery for exploring technological directions via patent data
266
Using Text Mining and Clustering to Group Research Proposals for Research Project Selection
267
Using text mining to analyze user forums
268
Using text mining to diagnose and classify epilepsy in children
269
Using Text Mining to Enrich the Vocabulary of Domain Ontologies
270
Using text mining to handle unstructured data in semiconductor manufacturing — Yan-Hsiu Liu
271
Using text mining to infer semantic attributes for retail data mining
272
Using text mining to understand traditional Chinese medicine pathogenesis of nonalcoholic fatty liver disease
273
Using Text Similarity to Detect Social Interactions not Captured by Formal Reply Mechanisms
274
Using textile electrode EMG for prosthetic movement identification in transradial amputees
275
Using text-spotting to query the world
276
Using Text-to-Speech Engine to Improve the Accuracy of a Speech-Enabled Interface
277
Using textual analysis with concept inventories to identify root causes of misconceptions
278
Using textual demographics to understand computer use: 1950-1990
279
Using textual information from LVCSR transcripts for phonetic-based spoken term detection
280
Using Textual Semantic Similarity to Improve Clustering Quality of Web Video Search Results
281
Using textural and statistical data for almond and olive fields classification
282
Using Texture Analysis for Medical Diagnosis
283
Using texture analysis method to removal moving human cast shadow
284
Using texture and fractal analysis for classification of cell nuclei from light scattering spectroscopic images
285
Using Texture Descriptor and Radon Transform to Characterize Protein Structure and Build Fast Fold Recognition
286
Using texture from high resolution Terrasar-X images for tropical forest mapping
287
Using texture mapping with mipmapping to render a VLSI layout
288
Using texture maps to correct for optical distortion in head-mounted displays
289
Using texture synthesis for non-photorealistic shading from paint samples
290
Using texture to annotate remote sensed datasets
291
Using texture-based symbolic features for medical image representation
292
Using T-functions for optimization of gyrotron TE
On
mode converters
293
Using the "HotWire" to Study Interruptions in Wearable Computing Primary Tasks
294
Using the “Physics” of notations to analyze a visual representation of business decision modeling
295
Using the λ function to evaluate probe measurements of charged dielectric surfaces
296
Using the μ-interaction measuring in the design and stability analysis of decentralized control structures
297
Using the 2D-FDTD method for the accurate analysis of superconducting coplanar waveguides and the design of planar rectangular inductors
298
Using the 2nd law of thermodynamics to quantify the extra power required for each irreversible process in compression cycle heat pumps
299
Using the 3LGM2 Tool for Modeling the Imaging Departme nt Workflow
300
Using the 3T architecture for tracking Shuttle RMS procedures
301
Using the 5W+1H Model in Reporting Systematic Literature Review: A Case Study on Software Testing for Cloud Computing
302
Using the 8 bit CCIR Recommendation 601 digital interface
303
Using the 802.11e EDCF to achieve TCP upload fairness over WLAN links
304
Using the 8051 Microcontroller with Resonant Transducers
305
Using the ACART Process for Architecture Compliance
306
Using the Access Grid as a testbed for network management research
307
Using the ACM technique to refine protein spots in 2DGE images
308
Using the Acoustic Doppler Velocimeter (ADV) in the MUDBED real-time observing system
309
Using the Action-Research Method in Information Systems Planning creativity research
310
Using the active appearance algorithm for face and facial feature tracking
311
Using the Active Appearance Model to detect driver fatigue
312
Using the active object model to implement multi-agent systems
313
Using the Adaboost algorithm for extracting fuzzy rules from low quality data: Some preliminary results
314
Using the adaptive blockset for simulation and rapid prototyping
315
Using the adaptive simulated annealing algorithm to estimate ocean-bottom geoacoustic properties from measured and synthetic transmission loss data
316
Using the adjoint method for optimization in a two-dimensional finite volume plasma discharge simulation
317
Using the ADL Experience API for Mobile Learning, Sensing, Informing, Encouraging, Orchestrating
318
Using the ADSP-21061 SHARC EZ-KIT in undergraduate DSP oriented courses
319
Using the ADTree for feature reduction through knowledge discovery
320
Using the advanced DMS functions to handle the impact of plug-in Electric vehicles on distribution networks
321
Using the AffectButton to measure affect in child and adult-robot interaction
322
Using the Agile Unified Process in Banking
323
Using the AIN for personal mobility services
324
Using the algebraic structure of articulated robot dynamics in control design
325
Using the algebraic sum method in medical expert systems
326
Using the Allan variance and power spectral density to characterize dc nanovoltmeters
327
Using the Allan variance and power spectral density to characterize DC nanovoltmeters
328
Using the Altera UP 1 board for prototyping and VGA video display generation
329
Using the Amazon Mechanical Turk for transcription of spoken language
330
Using the Amazon Metric to Construct an Image Database based on what people do, not what they say.
331
Using the Amplitude Fluctuation Property of Target HRRP for Radar Automatic Target Recognition
332
Using the amplitude variation of a reverberation chamber channel to predict the synchronization of a wireless digital communication test system
333
Using the analytic hierarchy process for strategic and policy decisions in engineering management
334
Using the Analytic Hierarchy Process to Examine Judgment Consistency in a Complex Multiattribute Task
335
Using the Analytic Network Process to establish a new evaluation model of environment livability
336
Using the Ant Colony Optimization algorithm for the Capacitated Vehicle Routing Problem
337
Using the APOS to design computer dynamic activities for learning the linear function
338
Using the architecture description language MetaH for designing and prototyping an embedded reconfigurable sliding mode flight controller
339
Using the architecture description language MetaH for designing and prototyping an embedded spacecraft attitude control system
340
Using the Arduino Uno to teach digital control of power electronics
341
Using the arithmetic representation properties of data to reduce the area and power consumption of FFT circuits for wireless OFDM systems
342
Using the ARM Cortex-M4 and the CMSIS-DSP library for teaching real-time DSP
343
Using the Artificial Neural Network to discriminate between normal controls with different APOE e4 genotypes and probable AD cases in PIB-PET studies
344
Using the ARTIST approach for diagnosing power transmission networks
345
Using the assessment center approach for faculty assessment
346
Using the ASTRAL model checker to analyze Mobile IP
347
Using the Asynchronous Paradigm for Reversible Sequential Circuit Implementation
348
Using the Augmented Data Manipulator Network in PASM
349
Using the Augmented Reality Technique to Develop Visualization Mindtools for Chemical Inquiry-Based Activities
350
Using the augmented vector space model to support the knowledge worker in document filtering
351
Using the Austin Technology Incubator as an “innovation boot camp” and as a catalyst to foster global commercialization strategies
352
Using the Averaged Hausdorff Distance as a Performance Measure in Evolutionary Multiobjective Optimization
353
Using the base semantics given by fUML for verification
354
Using the baseband processor power management technology for mobile devices
355
Using the bat: a six-dimensional mouse for object placement
356
Using the Bayesian analysis method of the 0–1 distribution in the medical examination
357
Using the BBC Microcomputer in School Science Experiments—An Introduction to Interfacing using the Analogue Port
358
Using the BCH construction to generate robust linear hash functions
359
Using the Behavior Markup Language for human-robot interaction
360
Using the Berlekamp-Massey algorithm to obtain LFSR characteristic polynomials for TPG
361
Using the best linear approximation as a first step to a new non-invasive glucose measurement
362
Using the best linear approximation to model the nonlinear behavior of supply modulated amplifiers
363
Using the beta-binomial distribution for the analysis of biometric identification
364
Using the Bhattacharyya parameter for design and analysis of cooperative wireless systems
365
Using the Bibliometric Analysis to Evaluate Global Scientific Production of Data Mining Papers
366
Using the bicausality concept to build reduced order observers in linear time invariant systems modelled by bond graph
367
Using the bifurcation theory to select pilot busbars in a secondary voltage regulation shceme
368
Using the binary maximum length sequence for the identification of system dynamics
369
Using the binomial transformer to approximate the Q distribution for maximally flat quarter-wavelength-coupled filters
370
Using the Biodiversity of Mollusca to Evaluate Water Environmental Quality in Hengyang Reaches of Xiangjiang River
371
Using the biosensor based on impedance measurement and sandwich immunoassay for carcinoembryonic antigen detection
372
Using the BioTac as a tumor localization tool
373
Using the Black Sea as airspace for satellites launching
374
Using the blood pressure waveform to reduce critical false ECG alarms
375
Using the bootstrap for robust detection in array signal processing
376
Using the bootstrap method to evaluate image noise for investigation of axial collimation in hybrid PET
377
Using the bootstrap method to evaluate image noise for investigation of axial collimation in hybrid PET
378
Using the bootstrap to estimate the variance in the case of undermodeling
379
Using the bootstrap to select models
380
Using the Boundary Element Method to calculate 3-D magnetic fields and potentials
381
Using the boundary scan delay chain for cross-chip delay measurement and characterization of delay modeling flow
382
Using the BPSO algorithm in image segmentation for dynamic thresholding
383
Using the brain´s fight-or-flight response for predicting mental illness on the human space flight program
384
Using the branch-line directional coupler in the design of microwave bandpass filters
385
Using the BS register for capturing and storing n-bit sequences in real-time
386
Using the BSC-AHP-FCA Method to Evaluate IT Performance of Construction Companies
387
Using the B-toolkit to ensure safety in SCR specifications
388
Using the business excellence model to transform your business
389
Using the butterfly effect in a deterministic non-linear system to detect Land cover change
390
Using the C language to reduce the design cycle of an MPEG-2 video IC: a case study
391
Using the C_net for Formalizing Workflow Patterns
392
Using the calculable dipole antenna for antenna calibration and validation of EMC test sites
393
Using the Callback Function Realization Touch Screen Gestures Recognition of Computer
394
Using the CAN protocol and reconfigurable computing technology for Web-based smart house automation
395
Using the Canny edge detector for feature extraction and enhancement of remote sensing images
396
Using the Case-Based Ranking Methodology for Test Case Prioritization
397
Using the Cayley-Hamilton theorem with N-partitioned matrices
398
Using the CCRS along track InSAR to measure and interpret ocean surface currents
399
Using the Cell Processor As a Network Assist to Minimize Latency
400
Using the Changes in Hydrostatic Pressure and Pulse Transit Time to Measure Arterial Blood Pressure
401
Using the Chaotic Map in Image Steganography
402
Using the Chaotic Map in Image Steganography
403
Using the characteristics of chaotic dynamics in the knowledge base of decision support system
404
Using the charge pumping geometric component to extract NBTI induced mobility degradation
405
Using the charge recycling technique for low power PLA design
406
Using the Chinese Remainder Theorem for the Grouping of RFID Tags
407
Using the chip as a temperature sensor — The influence of steep lateral temperature gradients on the V
ce
(T)-measurement
408
Using the chipKIT to apply a novel concept for configuring embedded online labs
409
Using the CIP Protocol with IEC 61499 Communication Function Blocks
410
Using the Circal process algebra in digital system design
411
Using the circuit theory to derive the mathematical models of AC machines. a review
412
Using the CLEAN algorithm to restore undersampled synthetic aperture sonar images
413
Using the Clinical Document Architecture as Open Data Exchange Format for Interfacing EMRs with Clinical Decision Support Systems
414
Using the cloud to build a computing lab
415
Using the Cloud to Facilitate Global Software Development Challenges
416
Using the cluster-based location routing (CBLR) algorithm for exchanging information on a motorway
417
Using the clutch-brake motor as an industrial control element
418
Using the CMM to evaluate student SE projects
419
Using the Cockroft-Walton voltage multiplier design in handheld devices
420
Using the Cockroft-Walton voltage multiplier with small photomultipliers
421
Using the coefficient of variation to improve the sparsity of seismic data
422
Using the cognitive walkthrough to improve the design of a visual programming experiment
423
Using the Coherence Correlation Interferometry (CCI) technique for study topography of the C-Ni films deposited on porous silicon
424
Using the coherence function for noise reduction
425
Using the coherency function in measurement based small-signal analysis of large power systems
426
Using the coherency function to detect large-scale dynamic system modal observability
427
Using the collective intelligence of sports fans to improve professional football league customer service
428
Using the color set back-projection algorithm in retrieval and evaluation of endoscopic images from patients with peptic ulcer
429
Using the combinatorial optimization approach for DVS in high performance processors
430
Using the Committee Machine Method to Forecasting on the FOREX
431
Using the common benefits from land information systems in the planning of a geographic facility management system
432
Using the Common Component Architecture to design high performance scientific simulation codes
433
Using the Common Criteria to Elicit Security Requirements with Use Cases
434
Using the common LAN to introduce ATM connectivity
435
Using the compiler to improve cache replacement decisions
436
Using the complex network for solving TSP problem
437
Using the composite surface model for perceptual tasks
438
Using the compressed data model in object-oriented data warehousing
439
Using the Computer Algebra System MAPLE to Learn and Do Calculus
440
Using the computer as a tool in engineering technology programs
441
Using the computer to set transmission line phase distance and ground back-up relays
442
Using the computer to teach¿a new and simple approach
443
Using the concept of linkage of closed loops to determine topological invariants of a cutting graph
444
Using the concept of obtainable efficiency bandwidth to study tunable matching circuits
445
Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
446
Using the CONDENSATION algorithm for robust, vision-based mobile robot localization
447
Using the condensation algorithm to implement tracking for mobile robots
448
Using the conformal embedding analysis to compensate the channel effect in the I-vector based speaker verification system
449
Using the confusion matrix for improving ensemble classifiers
450
Using the conjugate gradient algorithm for reduced-rank adaptive detection
451
Using the continuum of fractional Fourier domains to compensate dispersion in optical coherence tomography
452
Using the control duration to stabilize a multimode laser
453
Using the convolutional codes with maximum slope to optimize performance of woven convolutional codes
454
Using the C-OODA model for CIMIC analysis
455
Using the cooperative robots concept in emergency and catastrophes medicine
456
Using the correct fuse
457
Using the correct fuse
458
Using the correct fuse
459
Using the correct fuse
460
Using the correlation dimension for estimation of the complexity of visual evoked potential signal
461
Using the correlation property of subharmonic response as an index of cavitation of microbubbles [ultrasonics contrast agent]
462
Using the COSMIC Method to Evaluate the Quality of the Documentation of Agile User Stories
463
Using the Cowichan problems to assess the usability of Orca
464
Using the CPU and GPU for real-time video enhancement on a mobile computer
465
Using the criterion of technical efficiency for set-up of line distance relay protection
466
Using the cross-bridge structure to monitor the effective oxide sidewall-spacer width in LDD transistors
467
Using the Cross-Entropy method for control optimization: A case study of see-and-avoid on unmanned aerial vehicles
468
Using the crowds to satisfy unbounded requirements
469
Using the CS decomposition to compute the 8-point DCT
470
Using the current control for dynamic voltage scaling to reduce the power consumption of PC systems
471
Using the CY7C44X and CY7C45X FIFOs at 70 MHz
472
Using the Cyclostationarity of Electrical Signal for Bearing Fault Detection in Induction Machine
473
Using the cyclostationary properties of chaotic signals for communications
474
Using the DAPGF filter for speech analysis: Application for cochlear implants
475
Using the Data Access Protocol with IDL
476
Using the Data Mining Approach to Determine the Product Preferences of Target Customers
477
Using the Data Mining Based Fuzzy Classification Algorithm for Power Distribution Fault Cause Identification with Imbalanced Data
478
Using the data on a person´s pose in the “smart home” system
479
Using the Davey-MacKay code construction for barcodes in DNA sequencing
480
Using the DC bus current to improve the power factor in low-cost electric drives
481
Using the DC-bus current to improve the power factor in low-cost electric drives
482
Using the debugger as an integral part of teaching CS1
483
Using the decision tree for emphasizing the benefits of associating antioxidants in the therapy of the metabolic syndrome
484
Using the Decision-Tree Model in Database Design
485
Using the Decomposition Tree for Directed-Network Reliability Computation
486
Using the Decomposition-Tree of a Network in Reliability Computation
487
Using the defining issues test for evaluating computer ethics teaching
488
Using the Delaunay Triangulation/ Voronoi Diagram to extract Building Information from Raw LIDAR Data
489
Using the delayed feedback to control the vibration of semi-active suspension system for high-speed train
490
Using the Delphi method
491
Using the Dempster–Shafer Theory of Evidence With a Revised Lattice Structure for Activity Recognition
492
Using the design of experiments (DoE) method to elaborate an electrical ageing model for the insulation of low voltage rotating machines fed by inverters
493
Using the DEVS paradigm to implement a simulated processor
494
Using the DFT to synthesize bivariate orthogonal white noise series
495
Using the Dialogic Communication Model to Teach Students to Write a Report Introduction Tutorial
496
Using the Digital Computer in Industrial Power System Design
497
Using the digital holographic interference microscope for investigation of blood erythrocytes morphology of pregnant women and newborn infants
498
Using the diophantine equation in the design of a digital perfect tracking compensator
499
Using the DIRAC framework within the GRIDIFIN training infrastructure
500
Using the Directional Derivative Trace Transform for Seismic Wavefield Separation
501
Using the directory to support CIM management
502
Using the Discrete Squaring Function in the Delayed Message Authentication Protocol
503
Using the disparity space to compute occupancy grids from stereo-vision
504
Using the distance distribution for approximate similarity queries in high-dimensional metric spaces
505
Using the Distiller to direct the development of self-configuration software
506
Using the Distribution of Cells by Dimension in a Cylindrical Algebraic Decomposition
507
Using the Douglas-Rachford Algorithm to Optimally Reduce the PAPR
508
Using the drive train for active damping of oscillations in rotor blades in gearless wind-energy-converters with PMSM
509
Using the drive train of an gearless wind-energy-converter for active damping of oscillations in rotor blades
510
Using the dual approach of FAO-56 combined with multi-sensor remote sensing for estimating the regional evapotranspiration
511
Using the dual path property of omega networks to obtain conflict-free message routing
512
Using the dynamic behavior of superimposed fields for point field-based current sensing
513
Using the Dynamic Behavior of Superimposed Fields for Point-Field-Based Current Sensing
514
Using the Dynamic Environment Simulator for equipment testing
515
Using the Dynamic Power Source Technique to Reduce TCAM Leakage Power
516
Using the dynamical system approach to navigate in realistic real-world environments
517
Using the earth mover´s distance for perceptually meaningful visual saliency
518
Using the Echo Nest´s automatically extracted music features for a musicological purpose
519
Using the ECN Nonce to Detect Spurious Loss Events in TCP
520
Using the ECOGRAI method for performance evaluation in maintenance process
521
Using the ecological footprint model to assess ecological environment impacts of expressway
522
Using the economic value of the firm as a basis for assessing the value of process improvements
523
Using the EKV model to describe the DC operation in weak inversion of the multiple-input FGMOS transistor
524
Using the Electromyogram to Anticipate Torques About the Elbow
525
Using the EM algorithm to estimate the disease parameters for smallpox in 17th century London
526
Using the EM algorithm to increase the number of signals estimable by 2-D parametric techniques
527
Using the EM algorithm to train neural networks: misconceptions and a new algorithm for multiclass classification
528
Using the EM simulation tools to predict EMC immunity behavior of a automotive electronic board after a component change
529
Using the EM simulation tools to predict the Conducted Emissions level of a DC/DC boost converter: Introducing EBEM-CE model
530
Using the embedded Ethernet communication capability of PLC controller for tailor-made Manufacturing Execution System
531
Using the EMTP and the Omicron for developing and testing a transient based digital ground-fault relay far isolated or compensated networks
532
Using the energy integral of soil water retention curve to evaluate the Soil water availability
533
Using the Energy Name Service (ENS) for electric mobility roaming
534
Using the entropy in the SPARC instruction set
535
Using the EPLL algorithm as a preprocessor for fault analysis
536
Using the EPSA rubric to evaluate student work on ethics case studies in a Professional Issues course
537
Using the equitable partition technique to determine the non-controllability of dynamic networks
538
Using the Erlang language for multi-agent systems implementation
539
Using the ES2 library and SILOS simulator in the development of a single chip with three processors and analog IO
540
Using the estimate of coherence to monitor the depth of anaesthesia
541
Using the Euclidean Distance as a Mechanism Distance between Signatures to the Detect Spam and Phishing Scams
542
Using the Euler-Krylov angles for the linear transformation of the phase variable basis
543
Using the European Foundation for Quality Management Excellence Model to improve organisations performance
544
Using the evaluation nets modeling tool concept as an rnhancement of the Petri net tool
545
Using the excitation surface plasma waves of Kretschmann configuration to the normal saline measurement
546
Using the EXECO Toolkit to Perform Automatic and Reproducible Cloud Experiments
547
Using the Executable Semantics for CFG Extraction and Unfolding
548
Using the Existing Spectral Clutter Filter With the Nonuniformly Spaced Time Series Data in Weather Radar
549
Using the Expansion-Control framework for measuring management action in support of emerging technologies
550
Using the expectation-maximization algorithm for depth estimation and segmentation of multi-view images
551
Using the experience sampling method to evaluate ubicomp applications
552
Using the experiential learning model to transform an engineering thermodynamics course
553
Using the expert´s diagrams as a specification of expertise
554
Using the extension function of XSLT and DSL to secure XML documents
555
Using the Extreme Learning Machine (ELM) technique for heart disease diagnosis
556
Using the extrusion technique to fashion amorphous channel waveguide lasers
557
Using the Eye Tracking Technique to Evaluate Non-Linear Narratives
558
Using The Eye Wink Control Interface To Control A Powered Wheelchair
559
Using the ez-cryptosystem for data transmission in virtual private networks (Vpn)
560
Using the F2 OODBMS to support incremental knowledge acquisition
561
Using the factor model to analyze Internet BBS messages and stock returns
562
Using the Fault Current Limiter With Spark Gap to Reduce Short-Circuit Currents
563
Using the fault disturbance recorder as an operating aid for control room operators at the national load dispatch center of peninsular Malaysia
564
Using the Feature Selective Validation technique to compare CEM code predictions and measurements of field distributions for cavity problems
565
Using the Feature Selective Validation technique to compare data sets
566
Using the FEM Meshes Adaption and Genetic Algorithms for Identification of Permeability in Normal Direction of Anisotropic Sheets
567
Using the FEniCS Package for FEM Solutions in Electromagnetics
568
Using the FFT as an arbitrary function generator
569
Using the fibre optical measurement system for controlling combustion process in power boiler
570
Using the Findings of a Mapping Study to Conduct a Research Project: A Case in Knowledge Management in Software Testing
571
Using the Fisher kernel method for Web audio classification
572
Using the flatness of DC-Drives to emulate a generator for a decoupled MPC using a geometric approach for motion control in Robotino
573
Using the FLNR Accelerator Complex for SEE Testing: State of Art and Future Development
574
Using the floor control mechanism in distributed multimedia presentation system
575
Using the focus group method in software engineering: obtaining practitioner and user experiences
576
Using the FOMDA approach to support object-oriented real-time systems development
577
Using the format concept analysis to construct the tourism information ontology
578
Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator´s control in an unknown environment
579
Using the Fourier series in a circuits or DSP laboratory
580
Using the Fourier slice theorem for representation of object views and models with application to face recognition
581
Using the Fourier transform to compute the weight distribution of a binary linear block code
582
Using the fractal code to watermark images
583
Using the fractal code to watermark images
584
Using the fractal dimension (FD) to discriminate between targets and clutter
585
Using the FRAME Architecture for planning integrated Intelligent Transport Systems
586
Using the Friction between Business Processes and Use Cases in SOA Requirements
587
Using the fuel cell technology to produce electricity from hydrogen electrolyzing seawater and as a by-product desalinized water
588
Using The Full Scale 3D Solid Anthropometric Model in Radiation Oncology Positioning and Verification
589
Using the Function Block Model for Robotic Arm Motion Control
590
Using the functional data model to integrate distributed biological data sources
591
Using the Functional Model for Customizable Web Services Specification
592
Using the function-controlled technique in a small-type UPS
593
Using the future L-band communication system for navigation
594
Using the future L-band communication system for navigation
595
Using the fuzzy analytic hierarchy process to the balanced scorecard: A case study for the elementary and secondary schools´ information department of south Taiwan
596
Using the fuzzy multiple criteria decision making approach for risk evaluation on investment of overseas project
597
Using the fuzzy object model for geographical information systems
598
Using the fuzzy sets theory in the multimodal transport network problem
599
Using the GasNet model in discrete domains
600
Using the general energy function of the random neural networks to solve the graph partitioning problem
601
Using the General Intensional Programming System (GIPSY) for Evaluation of Higher-Order Intensional Logic (HOIL) Expressions
602
Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images
603
Using the generalized Radon transform for detection of curves in noisy images
604
Using the Generic Product Model for storing and sharing ERP data
605
Using the genetic algorithm to adapt intelligent systems
606
Using the genetic algorithm to build optimal neural networks for fault-prone module detection
607
Using the Gestalt Principle of Closure to Alleviate the Edge Crossing Problem in Graph Drawings
608
Using the Gfarm File System as a POSIX Compatible Storage Platform for Hadoop MapReduce Applications
609
Using the GGVF for automatic initialization and splitting snake model
610
Using the Global Positioning System (GPS) to add Intelligence to Wireless Handover in WLAN
611
Using the Global Positioning System for Earth orbiter and deep space tracking
612
Using the Goal-oriented pattern family framework for modelling outcome-based regulations
613
Using the Goertzel algorithm as a filter
614
Using the goodness-of-fit to validate the power sensor linearity specification
615
Using the Gouy phase to increase the sensitivity of electro-optic sampling
616
Using the GPGPU for scaling up Mining Software Repositories
617
Using the GPOF-algorithm in ground penetrating radar systems
618
Using the GPU and Multi-core CPU to Generate a 3D Oviduct through Feature Extraction from Histology Slides
619
Using the GPU for fast symmetry-based dense stereo matching in high resolution images
620
Using the GPU to Green an Intensive and Massive Computation System
621
Using the Gram-Charlier expansion in power systems reliability
622
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency
623
Using the GREMLIN for digital FIR networks
624
Using the Grey Box Technique in Measurement Systems
625
Using the GRID for biodiversity research: the GRAB demonstrator
626
Using the Grid for Enhancing the Performance of a Medical Image Search Engine
627
Using the grid for the BaBar experiment
628
Using the grid infrastructure in weather prediction: the WRF-ARW model
629
Using the Grid to Test the ATLAS Trigger and Data Acquisition System at Large Scale
630
Using the Grid to Test the ATLAS Trigger and Data Acquisition System at Large Scale
631
Using the grid-side converters of renewable energies for ancillary services
632
Using the group decision making matrix in the selection of business location
633
Using the group decision making matrix to evaluate RFID supplies
634
Using the group genetic algorithm for attribute clustering
635
Using the Group Interviewing Techniques to Analyze Audiences: Strategies for Gaining User Input for Enhancing Online, Hypertext, and Soficopy Documentation
636
Using The GSM/UMTS SIM to Secure Web Services
637
Using the GTSOM network for mobile robot navigation with reinforcement learning
638
Using the Halbach magnet array to develop an ultrahigh-speed spindle motor for machine tools
639
Using the Half Fourier Transform for SEM analysis of both early and late time responses in the presence of noise
640
Using the hard shoulder and narrowing lanes to reduce traffic congestion some lessons from an experience on the Paris motorway network
641
Using the hardware/software co-design methodology to implement an embedded face recognition/verification system on an FPGA
642
Using the HAZOP analysis in the maintenance, modifications and installation of subsea petroleum production systems
643
Using the HCTL-1000 Motor Control Chip for Coordinated Robot Motions
644
Using the H-Divergence to Prune Probabilistic Automata
645
Using the head to stabilize action: Reaching by young children
646
Using the heart harmonics in the oscillometry to extract the blood pressure
647
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform
648
Using the hexagonal segmented railgun in multishot mode with 3 projectiles
649
Using the Hexagonal Segmented Railgun in Multishot Mode With Three Projectiles
650
Using the higdon operator for the dual phase velocity boundary and the simulation of intermodulation
651
Using the high level architecture to implement selective-fidelity
652
Using the high order Nyquist zones in the design of efficient multi-channel digital upconverters
653
Using the histogram of oriented gradients for detecting cephalometric landmarks
654
Using the HLA for Distributed Continuous Simulations
655
Using the HMAC-Based One-Time Password Algorithm for TLS Authentication
656
Using the Hopfield model with mean field annealing to solve the routing problem in packet-switched communication networks
657
Using the Hopfield neural network as a classifier by storing class representatives
658
Using the Hopfield neural network with mean field annealing to solve the shortest path problem in a communication network
659
Using the Hotelling observer on multislice and multiview simulated SPECT myocardial images
660
Using the Hotelling observer on multi-slice and multi-view simulated SPECT myocardial images
661
Using the Hough transform for determining the length of a digital straight line segment
662
Using the Hough transform to detect circular forms in satellite imagery
663
Using the Huffman Code for Sequential Diagnosis
664
Using the human effect in the development of soft computing car following models
665
Using the Humanoid Robot KASPAR to Autonomously Play Triadic Games and Facilitate Collaborative Play Among Children With Autism
666
Using the HVS binocular properties for the construction of a comprehensive stereoscopic matching model
667
Using the hybrid series-parallel resonant converter with capacitive output filter and with PWM phase-shifted control for high-voltage applications
668
Using the Hybrid Systems Interchange Format to Input Design Models to Verification & Validation Tools
669
Using the hypercomplex numbers for instantaneous reactive power compensation
670
Using the I/O port on the 380z as a binary counter
671
Using the iCub simulator to study perceptual development: A case study
672
Using the IDEAL software process improvement model for the implementation of Automotive SPICE
673
Using the ideas of the information theory to study communication systems of social animals
674
Using the iDTV for Managing Services in the Ubiquitous Computing Environment
675
Using the IEEE 802.11 Frame Check Sequence as a pseudo random number for packet sampling in wireless networks
676
Using the IEEE Comprehensive Test Feeder
677
Using the IEEE Mentoring Connection [The Gold Report]
678
Using the IEEE SDF import format and the CIM for model exchange
679
Using the IIPS framework to specify machine-discovery problems
680
Using the Image Recognition Techniques to Implement an Automatic Examining Mechanism for the Sports Fitness
681
Using the imaging network teaching system based on PACS in improvement of teaching effect in medical imaging
682
Using the impact matrix for predictive situational awareness
683
Using the implicit surface paradigm for smooth animation of triangle meshes
684
Using the imprecise-computation technique for congestion control on a real-time traffic switching element
685
Using the improved DSMC method to predict the reliability of micro-flow channels
686
Using the incidence matrix in an evolutionary algorithm for computing minimal siphons in Petri net models
687
Using the inclined-plane test to evaluate the resistance of outdoor polymer insulating materials to electrical tracking and erosion
688
Using the incremental approach to generate test sets: a case study
689
Using the induction motor as a flux sensor: new control perspectives for zero-speed operation of standard drives
690
Using the influence model coefficients and the random walk to predict emotional interactions in parent-child conversations
691
Using the Infocus-Breakpoint to estimate the scale of neoplasia in colonoscopy
692
Using the information from reference station networks: a novel approach conforming to RTCM V2.3 and future V3.0
693
Using the information technologies for modeling of economic tasks
694
Using the information: incorporating positive feedback information into the testing process
695
Using the inner-distance for classification of articulated shapes
696
Using the innovative NCTUns 3.0 network simulator and emulator to facilitate network researches
697
Using the Instantaneous Power of a Free Acceleration Test for Squirrel-Cage Motor Parameters Estimation
698
Using the Instantaneous Power Theory in order to control the current in the parallel active filter to compensate reactive power and reduction of harmonics
699
Using the intelligence of mobile agents in road management systems
700
Using the Intelligent Agent on the Telecom Electronic Commerce Website
701
Using the IntelRate Controller to Improve Throughput and Queue Size of High-Speed WLANs
702
Using the Inter- and Intranet in a university introductory psychology course to promote active learning
703
Using the Inter- and Intra-Switch Regularity in NoC Switch Testing
704
Using the interaction on social networks to predict real life friendship
705
Using the Interferometric Capabilities of the ESA CryoSat-2 Mission to Improve the Accuracy of Sea Ice Freeboard Retrievals
706
Using the Interleaved Sampling of the Multi-Channels to Broaden Bandwidth of Embedded Oscilloscope Systems
707
Using the Intermeans Parameter to Measure the Dispersion when Solving the Newsboy Problem
708
Using the internet as a Collective Intelligence platform in harnessing issues on climate change
709
Using the Internet as a communication infrastructure for lead user involvement in the new product development process
710
Using the Internet as a learning medium: an exploration of gender difference in the adoption of FaBWeb
711
Using the Internet as a new teaching method
712
Using the internet communication tools to facilitate learning
713
Using the Internet for audience and customer research
714
Using the Internet for distance teaming/distance teaching
715
Using the internet for meteorological radars networking
716
Using the Internet for plasma physics education
717
Using the Internet on a Cruise Ship [From the Screen of Stone]
718
Using the Internet to assist clinical decision making
719
Using the Internet to communicate software metrics in a large organization
720
Using the Internet to help meet learning goals in a conventional university environment - some experiences
721
Using the Internet to provide support for distributed interactions
722
Using the Internet to teach software engineering
723
Using the Introductory Simulation Course to Teach Process Dynamics and Extended Operations Management Concepts
724
Using the inverted classroom to teach software engineering
725
Using the IOC-24 in a real-time signal processing/data acquisition subsystem
726
Using the IOT to construct ubiquitous learning environment
727
Using the iPad as a pedagogical tool to enhance the learning experince for novice programing students
728
Using the iPhone and iPod Touch for remote sensor control and data acquisition
729
Using the IPython notebook as the computing platform for signals and systems courses
730
Using the ISIS resource manager for distributed, fault-tolerant computing
731
Using the ISO/IEC 9126 product quality model to classify defects: A controlled experiment
732
Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study
733
Using the iterative learning algorithm as data source for ANFIS training
734
Using the Java-DSP Real-Time Hardware Interface in Undergraduate Classes
735
Using the Juliet Test Suite to compare static security scanners
736
Using the KADS methodology: expert systems in farm management
737
Using the Kalman filter to detect frequency jumps in atomic clocks
738
Using the Karhunen-Loe´ve transformation in the back-propagation training algorithm
739
Using the Karhunen-Loeve expansion for feature extraction on small sample sets
740
Using the KDD process to support Web site reconfigurations
741
Using the KDSM methodology for knowledge discovery from a labor domain
742
Using the kernel trick in compressive sensing: Accurate signal recovery from fewer measurements
743
Using the Kinect for detecting tremors: Challenges and opportunities
744
Using the Kinect for search and rescue robotics
745
Using the Kinect sensor with open source tools for the development of educational games for kids in pre-school age
746
Using the Kinect to detect potentially harmful hand postures in pianists
747
Using the kinect to limit abnormal kinematics and compensation strategies during therapy with end effector robots
748
Using the KL-center for efficient and accurate retrieval of distributions arising from texture images
749
Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering
750
Using the knowledge of the constraints network to design an evolutionary algorithm that solves CSP
751
Using the Kohonen topology preserving mapping network for learning the minimal environment representation
752
Using the Kolbe A ™ Conative Index to Study the Retention of Computer Science Students
753
Using the Kullback-Leibler divergence to combine image priors in Super-Resolution image reconstruction
754
Using the Kurtosis Measure to Identify Clusters in Wireless Channel Impulse Responses
755
Using the lag of autocorrelation function in order to identify the anaerobic threshold during dynamic physical exercise
756
Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency
757
Using the latency insertion method (LIM) to generate X parameters
758
Using the latest developments in mobile technology to improve students´ engagement with assessment feedback
759
Using the least-squares boundary residual method to model the symmetrical five-port waveguide junction
760
Using the Lego-Mindstorm kit in German Computer Science Education
761
Using the length of the speech to measure the opinion
762
Using the lens of Max Weber´s theory of bureaucracy
763
Using the levels of conceptual interoperability model and model-based data engineering to develop a modular interoperability framework
764
Using the Levenshtein Edit Distance for Automatic Lemmatization: A Case Study for Modern Greek and English
765
Using the Liberty Alliance Architecture to Secure IP-level Handovers
766
Using the light-impact model for p-type and n-type poly-TFT in circuits
767
Using the lightweight falling deflectometer for monitoring trial railway sections with under-ballast geocomposites
768
Using the load current of the CPU to dynamically control the voltage and reduce the power consumption of PC systems
769
Using the local information of image to identify the source camera
770
Using the local mode for edge detection in ultrasound images
771
Using the localization method for once-through boiler control
772
Using the lock manager to choose timestamps
773
Using the log-normal distribution in the statistical treatment of experimental data affected by large dispersion
774
Using the LogSig-function to integrate expert knowledge to self-organizing map (SOM) based analysis
775
Using the Lomb periodogram for non-contact estimation of respiration rates
776
Using the Lorentz distribution to model fade slope at free space optical communication systems
777
Using the Loss-Free Resistor Concept to Design a Simple AC–DC HB-LED Driver for Retrofit Lamp Applications
778
Using the loss-free resistor concept to design a simple ac-dc HB-LED driver for retrofit lamp applications
779
Using the low frequency component of the background signal for SiGe and Ge growth monitoring
780
Using the low-resolution properties of correlated images to improve the computational efficiency of eigenspace decomposition
781
Using the LU Recombination Method to Extend the Application of Circuit-Oriented Finite Element Methods to Arbitrarily Low Frequencies
782
Using the Lyapunov exponent from cepstral coefficients for automatic emotion recognition
783
Using the Maintenance Management Information System (MMIS
TM
) to Support the Warfighter
784
Using the management team approach on a knowledge-based systems project: capitalizing on individuals´ expertise
785
Using the Marginal Spectrum Method to Extract Spherical Free Oscillation of Strong Earthquakes
786
Using the marginalised particle filter for real-time visual-inertial sensor fusion
787
Using the Markov chain of the best individual to analyze convergence of genetic algorithms
788
Using the master-slave parallel architecture for genetic-fuzzy data mining
789
Using the Matlab-based iRobot create simulator to engage introductory computer programming students in program development and observing computational errors
790
Using the matrix diagram method to build an organizational taxonomy for a developing multi-disciplinary center
791
Using the matrix exponential solution to the direction cosine differential equation
792
Using the matrix pencil method to analyze a 3D leaky wave antenna
793
Using the matrix pencil method to estimate the parameters of a sum of complex exponentials
794
Using the matrix pencil method to solve phase unwrapping
795
Using the Maximum Between-Class Variance for Automatic Gridding of cDNA Microarray Images
796
Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification
797
Using the Max-Sum Algorithm for Supply Chain Emergence in Dynamic Multiunit Environments
798
Using the Maxwell grid equations to solve large problems
799
Using the MAXX simulator for electronic card manufacturing
800
Using the mean reliability as a design and stopping criterion for turbo codes
801
Using the MEAN stack to implement a RESTful service for an Internet of Things application
802
Using the Media Independent Information Service to Support Mobile Authentication in Fast Mobile IPv6
803
Using the Medipix2 detector for photon counting computed tomography
804
Using the Memory Channel Network
805
Using The Meta-Environment for Maintenance and Renovation
806
Using the metamodel mechanism to support class refinement
807
Using the Method Combining PCA with BP Neural Network to Predict Water Demand for Urban Development
808
Using the method of effective permittivity for polariton waveguide investigation
809
Using the method of minimum extension to extrapolation of antenna measurements
810
Using the method of moment NEC code to solve EMC problems
811
Using the method of neutron backscattering imaging to detect hidden explosives
812
Using the methods designers use as aids to thinking the case of public-private partnerships in sustainable agricultural value chain development
813
Using the methods of radiospectroscopy (EPR, NMR) to study the nature of the defect structure of solid solutions based on lead zirconate titanate (PZT)
814
Using the MetroWeb tool to improve usability quality of Web sites
815
Using the MicroASAR on the NASA SIERRA UAS in the Characterization of Arctic Sea Ice Experiment
816
Using The Microsoft Excel Pivot Table For Reliability Applications
817
Using the microsoft kinect for 3D map building and teleoperation
818
Using the middle tier to understand cross-tier delay in a multi-tier application
819
Using the MIL-C-38999 test fixture and an S-parameter test set to measure the transfer impedance of a new universal ground adapter
820
Using the Minimum Set of Input Combinations to Minimize the Area of Local Routing Networks in Logic Clusters Containing Logically Equivalent I/Os in FPGAs
821
Using the MIS capacitor for doping profile measurements with minimal interface state error
822
Using the mixed Gaussian distribution method to design of a threshold for CCD monitor
823
Using the MM5 Model for Wind Energy Resources Evaluation Over a Fuel-Poor Region, East China
824
Using the mobile phone as a security token for unified authentication
825
Using the mobile substations in 132Kv network and studying their effects on the losses of network
826
Using the Model Checker Spin for Web Application Design
827
Using the Model of Markets with Intermediaries as an Incentive Scheme for Opportunistic Social Networks
828
Using the model of the solar cell for determining the maximum power point of photovoltaic systems
829
Using the Model-Based Residual Bootstrap to Quantify Uncertainty in Fiber Orientations From
-Ball Analysis
830
Using the Modern Financial Theory to Obtain the Optimal Level of Contract Demand and Predict Payments of Electrical Energy Invoice
831
Using the modified fiber membrane to improve the efficiency of the blood separation in rapid test strip
832
Using the modified measuring setup at the PTB
833
Using the modular controller architecture (MCA) in ambient assisted living
834
Using the modulo inverse prefilter as a data scrambling device
835
Using the MoM impedance matrix interpolation with domain decomposition to increase computational efficiency of the wide-band performance evaluation of antennas
836
Using the moment generating function for the performance assessment of optically preamplified direct-detection OFDM systems
837
Using the Mono-Window Algorithm of ETM+6 Date to Interpret Geothermal Anomaly in Fuzhou Basin, China
838
Using the Morphology of the Photoplethysmogram Envelope to Automatically Detect Hypovolemia
839
Using the MOSART code for atmospheric correction
840
Using the Mothra software testing environment to ensure software quality
841
Using the motion perceptibility measure to classify points of interest for visual-based AUV guidance in a reef ecosystem
842
Using the motor drive as a sensor to extract spatially dependent information during servo operation
843
Using the Motor Drive as a Sensor to Extract Spatially Dependent Information for Motion Control Applications
844
Using the multi potential method applicable to the adaptive nonlinear mapping of medical images
845
Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique for Software Testing
846
Using the multilevel imbricated cells topologies in the design of low-power power-factor-corrector converters
847
Using the Multimedia Courseware and Network Information Technology to Optimize the Geography Classroom Instruction
848
Using the Multi-Mouse Quiz System for Quiz Making Activities in an Elementary School
849
Using the Multiple Knapsack Problem to Model the Problem of Virtual Machine Allocation in Cloud Computing
850
Using the Multiple-Clue approach for system testing on AIRBUS FAL (Final Assembly Line)
851
Using the Multiple-Clue approach for system testing on AIRBUS FAL (Final Assembly Line)
852
Using the multistage cube network topology in parallel supercomputers
853
Using the Multi-Start and Island Models for Parallel Multi-Objective Optimization on the Computational Grid
854
Using the Multi-Threaded Computation Model as a Unifying Framework for Hardware-Software Co-Design and Implementation
855
Using the nanoimprint-in-metal method to prepare corrugated metal structures for plasmonic biosensors through both surface plasmon resonance and index-matching effects
856
Using the National Information Infrastructure (NII) for monitoring, diagnostics and prognostics of operating machinery
857
Using the NAVOCEANO wide swath sidescan sonar Seamap-C to locate and differentiate man-made objects from natural features on the seafloor
858
Using the NDVI contribution ratio at different growth stages to estimate winter wheat yield
859
Using the near shortest transversal path to detect shot change
860
Using the NEDRES interactive database to find oceanographic information
861
Using the Network Description Language in Optical Networks
862
Using the Network Load for Admission Control in OBS Networks: A Multilink Approach
863
Using the new EPRI/BPA testing facility to evaluate the latest technologies in motors and drives
864
Using the newly microfluidic biosensor for carcinoembryonic antigen detection
865
Using the Newton simulation system as a testbed for control
866
Using the Newton Trust-Region Method to Localize in WLAN Environment
867
Using the Newton–Raphson Method in the Polarization Technique to Solve Nonlinear Static Magnetic Field Problems
868
Using the NextClosure algorithm to extract rules from trained neural networks application in solar energy systems
869
Using the nominal operating point as a design variable for gain scheduled controllers
870
Using the Non-Dominant Hand for Selection in 3D
871
Using the Non-Intrusive Load Monitor for Shipboard Supervisory Control
872
Using the nonlinear property of FSR and dictionary coding for reduction of test volume
873
Using the nonsteady-state photo-EMF technique for verification of Einstein relation in PVK based photoconductive polymers
874
Using the Notion of Structural Congruence to Support Adaptive Integration
875
Using the novel FLC dynamic buffer size tuning technique to support more dependable location-aware information retrieval
876
Using the NREN Testbed to Prototype a High-Performance Multicast Application
877
Using the NS-2 Network Simulator for Evaluating Multi Protocol Label Switching in Network-on-Chip
878
Using the NS-2 Network Simulator for Evaluating Network on Chips (NoC)
879
Using the ns-2 simulation environment to implement and evaluate bandwidth broker models
880
Using the NSF digital library to enhance your teaching
881
Using the Number of Faults to Improve Fault-Proneness Prediction of the Probability Models
882
Using the Number of Pores on Fingerprint Images to Detect Spoofing Attacks
883
Using the NuSMV Model Checker for Test Generation from Statecharts
884
Using the O-A diagram to encapsulate dynamic memory access
885
Using the object paradigm for distributed real-time systems
886
Using the object space: a distributed parallel make
887
Using the objectives development process of an environmental management system as an opportunity to achieve design for the environment
888
Using the ODP reference model for Enterprise Architecture
889
Using the ohmic resistance reverse conduction capability of MOSFETs in quasi-resonant converters
890
Using the OLS algorithm to build interpretable rule bases: an application to a depollution problem
891
Using the OMNeT++ discrete event simulation system in education
892
Using the online cross-entropy method to learn relational policies for playing different games
893
Using the on-resistance of a power MOSFET to control a DC-DC converter
894
Using the OPC standard for real-time process monitoring and control
895
Using the Open Library Architecture (OLA) open source API in heterogeneous design flows
896
Using the open network lab
897
Using the Open University Desmond to control a buggy
898
Using the operator function model and OFMspert as the basis for an intelligent tutoring system: towards a tutor/aid paradigm for operators of supervisory control systems
899
Using the optimized radial basis function neural network and instantanous features for ARCS
900
Using the OptionFinder in human resources consulting: a user´s point of view
901
Using the Orbit Tracking Code Z3CYCLONE to Predict the Beam Produced by a Cold Cathode Pig Ion Source for Cyclotrons under DC Extraction
902
Using the oscillation test method to test for delay faults in embedded cores
903
Using the output energy as performance index in the design of damping controllers for power systems
904
Using the P
3
T to guide the parallelization and optimization effort under the Vienna Fortran compilation system
905
Using the P
n
Potts model with learning methods to segment live cell images
906
Using the PAC-Amodeus model and design patterns to make interactive an existing object-oriented kernel
907
Using the Palomar Transient Factory to search for ultra-long-period Cepheid candidates in M31
908
Using the Panofsky-Wenzel theorem in the analysis of radio-frequency deflectors
909
Using the parallel complexity of programs to improve compaction
910
Using the Parallel Research Kernels to Study PGAS Models
911
Using the parallel second-order predictor-corrector algorithm for dynamic real-time simulation of synchronous generator
912
Using the parametric time-varying analog filter to average-evoked potential signals
913
Using the parametric time-varying filter to average BAEP signals
914
Using the pareto frontier to detect deficiencies in a biological simulation model
915
Using the Parsec environment to implement a high-performance processor farm
916
Using the Particle Filter as Mitigation to GPS Vulnerability for Navigation at Sea
917
Using the Particle Swarm Evolutionary Approach in Shape Optimization and Field Analysis of Devices Involving Nonlinear Magnetic Media
918
Using The Particle Swarm Evolutionary Approach in Shape Optimization and Field Analysis of Devices Involving Non-linear Magnetic Media
919
Using the Particle Swarm Optimization Algorithm for Robotic Search Applications
920
Using the particle swarm optimization technique to train a recurrent neural model
921
Using the PC architecture in embedded applications
922
Using the Pearson correlation coefficient to develop an optimally weighted cross relation based blind SIMO identification algorithm
923
Using the penalty function method to cope with mainbeam jammers
924
Using the Perceptual Difference Model (PDM) to Optimize GRAPPA Reconstruction
925
Using the Perturbed System to Analyze the Sensitivity of Influential Factors with Neural Networks
926
Using the Phantogram Technique for a Collaborative Stereoscopic Multitouch Tabletop Game
927
Using the Phase Change of a Reflected Microwave to Detect a Human Subject Behind a Barrier
928
Using the phase coherence of carrier-envelope phase-stabilized fs lasers
929
Using the phase III public relations professional to improve corporate communication and to help prevent crises
930
Using the photolysis of chemically modified gel films preparing ITO fine patterned thin films
931
Using the physical layer for wireless authentication in time-variant channels
932
Using the physical structure of a passive aerodynamic attitude-stabilization system as a multi-frequency antenna on nano-satellites
933
Using the Physics of Notations Theory to Evaluate the Visual Notation of SEAM
934
Using the physics of the fast fading to improve performance for mobile radio channels
935
Using the physics-based rendering toolkit for medical reconstruction
936
Using the PIC micro-controller as a Cryptographic Coprocessor for Digital Watermarking Applications
937
Using the Pilot Frequency from a Positive Feedback Pilot System to Improve Second Loop Convergence for a Feedforward Amplifier
938
Using the Pilot Library to Teach Message-Passing Programming
939
Using the planning scheduler in real-time fieldbuses: theoretical model for run-time overhead
940
Using the PMBOK Guide to Frame GSD Coordination Strategies
941
Using the Policy Control system as an auxiliary tool to improve the Service Assurance Process in Telecommunication Networks
942
Using the Power Side Channel of FPGAs for Communication
943
Using the powerful SABER simulator for simulation, modeling, and analysis of power systems, circuits, and devices
944
Using the prediction residual to improve LPC synthesis for 9600 bps applications
945
Using the Pre-FUFP Algorithm for Handling New Transactions in Incremental Mining
946
Using the Principal Component Analysis and BP Network to Model the Worsted Fore-spinning Working Procedure
947
Using the principle of measurement reproduction in federated filters for navigation data processing
948
Using the Principles of Bayesian Statistics to Improve the Performances of Medical Diagnostic Tests
949
Using the probabilistic evaluation tool for the analytical solution of large Markov models
950
Using the probabilistic model checker PRISM to analyze H-OTBA algorithm in Optical Burst Switching (OBS) networks
951
Using the Process of Norm Emergence to Model Consensus Formation
952
Using the project integrated management methodology to enhance the development, viability and sustainability of the SA PBMR and PWR component manufacturing sector
953
Using the PROMETHEE and TOPSIS multi-criteria decision making methods to evaluate optimal generation
954
Using the PROMETHEE multi-criteria decision making method to define new exploration strategies for rescue robots
955
Using the P-TOSCA model for energy efficient cloud
956
Using the Pylons Web Framework for Science Gateways
957
Using the Q measure to create panoramic photographs
958
Using the Q-learning algorithm in the constructive phase of the GRASP and reactive GRASP metaheuristics
959
Using the quality-time tradeoff in local optimization
960
Using the quantum capacitance in graphene to enable varactors for passive wireless sensing applications
961
Using the quickscan audit methodology as a precursor to a successful lean sigma implementation
962
Using the RADARSAT SAR versatility to enhance Fine Resolution imaging capabilities
963
Using the radial basis function model for the Brdicka curve fitting
964
Using the Rasch model to assess examination Beyond students´ scores
965
Using the raw diffusion MRI signal and the von Mises-Fisher distribution for classification of Alzheimer´s disease
966
Using the reactive current profile of a feeder to determine optimal capacitor placement
967
Using the real, gentle and modest AdaBoost learning algorithms to investigate the computerised associations between Coronal Mass Ejections and filaments
968
Using the real-time island detection and network colouring application in electrical systems
969
Using the receiver operating characteristic to asses the performance of neural classifiers
970
Using the reciprocity theorem for antenna calculations
971
Using the recognition and speech synthesis to assist the practice of English pronunciation
972
Using the reconfigurability of modern FPGAs for highly efficient PUF-based key generation
973
Using the recovery voltage method to evaluate aging in oil-paper insulation
974
Using the red chromaticity for illumination estimation
975
Using the REDEEM ITS authoring environment in naval training
976
Using the reduced Preisach vector model to predict the cut angle influence in Si-Fe steels
977
Using the redundant inverse kinematics system for collision avoidance
978
Using the relationship of shared neighbors to find hierarchical overlapping communities for effective connectivity in IoT
979
Using the Relative Disturbance Gain to Analyse Process Operability
980
Using the remote socket architecture as NAT replacement
981
Using the requirements specification to infer the implicit test status of requirements
982
Using the residual area criterion for signal reconstruction from noiseless and noisy samples
983
Using the reverse-carry approach for double datapath floating-point addition
984
Using the RFID technology to create a low-cost communication channel for data exchange
985
Using the RFID Wristband for Automatic Identification in Manual Processes - The RFID Wristband in the Automotive Industry
986
Using the RFIDs to Construct the Ubiquitous Self-Learning Environment for Understanding the Plants in the Schoolyard
987
Using the Rhythm of Nonverbal Human–Robot Interaction as a Signal for Learning
988
Using the Right Amount of Monitoring in Adaptive Load Sharing
989
Using the Right Terms [Stand on Standards]
990
Using the right tool for the job
991
Using the right tools and techniques leads to successful testing of MCMs
992
Using the RITA Threats Ontology to Guide Requirements Elicitation: an Empirical Experiment in the Banking Sector
993
Using the RNN to develop a Web-based pattern recognition system for pattern search of component database
994
Using the ROA Index to Analyze the Value of Optimum Stock
995
Using the Road Constraint Cellular Automata to Simulate the Urbanization in Zhengzhou
996
Using the robotic sixth finger and vibrotactile feedback for grasp compensation in chronic stroke patients
997
Using the robust statistics for travel time estimation on highways
998
Using the Role Matrix Technique to identify organisational changes a practical study within London Underground escalators maintenance service
999
Using the Rome Laboratory framework and implementation guidebook as the basis for an international software quality metric standard
1000
Using the root locus method to analyze pathological oscillations in neurological diseases