Showing 1 - 20 results of 28 for search '(( algorithm python function ) OR ((( algorithm gene function ) OR ( algorithm flow function ))))*', query time: 0.12s Refine Results
  1. 1

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”
  2. 2

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  3. 3

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”
  4. 4

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  5. 5

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  6. 6

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  7. 7

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  8. 8

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  9. 9

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet by Imran Siddique (12705185)

    Published 2024
    “…<p dir="ltr">In current work, the unsteady stagnation point’s flow on a special third-grade fuzzy hybrid (A⁢l<sub>2</sub>⁢O<sub>3</sub> +Cu/SA) nanofluid (HNF) through a permeable convective shrinking/stretching sheet has been scrutinized. …”
  10. 10

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  11. 11

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  12. 12
  13. 13

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 by Hibah Shaath (5599658)

    Published 2020
    “…Further analyses revealed genes associated with the inflammatory response and chemotaxis of myeloid cells, phagocytes, and granulocytes, among the top activated functional categories in BAL from severe COVID-19-affected patients. …”
  14. 14

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…Purpose Response to clopidogrel varies widely with nonresponse rates ranging from 4% to 30%. A reduced function of the gene variant of the CYP2C19 has been associated with lower drug metabolite levels, and hence diminished platelet inhibition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Contingency analysis of bulk power system using neural networks by Maghrabi, H.

    Published 1998
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  16. 16
  17. 17

    Gas pipeline modelling and control by Whalley, R

    Published 2015
    “…The pipeline input–output, transfer function, pressure and volume flow representations are formulated. …”
    Get full text
  18. 18
  19. 19
  20. 20

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…We find these pointcuts and primitives to be necessary because they are needed to perform many security hardening practices and, to the best of our knowledge, none of the existing ones can provide their functionalities. Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article