Search

Showing total 200 results

Search Constraints

Start Over You searched for: Topic algorithms Remove constraint Topic: algorithms Topic engineering and manufacturing industries Remove constraint Topic: engineering and manufacturing industries
200 results

Search Results

1. Helping to Shape the Future: Rama Akkiraju: As an IBM Fellow, Rama Akkiraju helps shape the company's future

2. Water pipe failure prediction and risk models: state-of-the-art review

3. Joint contexts optimization for mobile grid

4. Real-time FFT with pre-calculation

5. More efficient systolic arrays for multiplication in GF( 2 m ) using LSB first algorithm with irreducible polynomials and trinomials

6. On efficient implementation of FPGA-based hyperelliptic curve cryptosystems

7. On circumferential disposition of pipe defects by long-range ultrasonic guided waves

8. Robust multi bit and high quality audio watermarking using pseudo-random sequences

9. Multiobjective vehicle routing and scheduling problem with time window constraints in hazardous material transportation

10. A quadratic programming formulation for the design of reduced protein models in continuous sequence space

11. Optimization algorithm for selection and on site location of mobile cranes

12. Evaluation of the resource-constrained critical path method algorithms

13. Stochastic time-cost optimization model incorporating fuzzy sets theory and nonreplaceable front

14. A novel solution for maze traversal problems using artificial neural networks

15. Application of genetic approach for advanced planning in multi-factory environment

16. A strategic capacity allocation model for a complex supply chain: Formulation and solution approach comparison

17. Heuristics for the economic lot scheduling problem with returns

18. A least flexibility first heuristic to coordinate setups in a two- or three-stage supply chain

19. A note on due-date assignment and single machine scheduling with a learning/aging effect

20. A least flexibility first heuristic to coordinate setups in a two- or three-stage supply chain

21. The evolution of the network structure in the ICT sector

22. Maximizing the reward in the relocation problem with generalized due dates

23. Optimal lot size with learning consideration on an imperfect production system with allowable shortages

24. Finance-based scheduling: optimization of results-based funded multiple projects

25. Production-inventory scheduling using Ant System metaheuristic

26. A heuristic solution procedure for an integrated inventory system under controllable lead-time with equal or unequal sized batch shipments between a vendor and a buyer

27. A Heuristic Method for Modeling the Initial Pressure Drop in Melt Filtration Using Woven Screens in Polymer Recycling

28. Chemometrics in Spectroscopy: More About CLS, Part 1: Expanding the Concept

29. Testing evolutionary algorithms for optimization of water distribution networks

30. Adaptive beamforming algorithm with increased speed and improved reliability for smart antennas

31. Small target detection using cross product based on temporal profile in infrared image sequences

32. Error-free algorithm and architecture of radix-10 logarithmic converter

33. Power-based multi-cell call admission control scheme for wideband-CDMA systems

34. A distributed energy-efficient clustering protocol for wireless sensor networks

35. Invariant image watermarking using multi-scale Harris detector and wavelet moments

36. A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters

37. A routing-table-based adaptive and minimal routing scheme on network-on-chip architectures

38. Reliability optimization of topology communication network design using an improved ant colony optimization

39. Spatial error concealment: A novel exemplar-based approach using segmentation

40. Low complexity LMS-type adaptive algorithm with selective coefficient update for stereophonic acoustic echo cancellation

41. Dual-rail transition logic: A logic style for counteracting power analysis attacks

42. Dual purpose FWT domain spread spectrum image watermarking in real time

43. Resource management and task partitioning and scheduling on a run-time reconfigurable embedded system

44. An EDA tool for implementation of low power and secure crypto-chips

45. New left-to-right minimal weight signed-digit radix-r representation

46. An efficient cryptosystem Delta for stream cipher applications

47. Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses

48. Backup path set selection in ad hoc wireless network using link expiration time

49. A tabu search algorithm for the global planning problem of third generation mobile networks

50. Hardware and software architecture for power quality analysis