Search alternatives:
algorithms among » algorithms a (Expand Search), algorithm using (Expand Search), algorithm aoa (Expand Search)
algorithms among » algorithms a (Expand Search), algorithm using (Expand Search), algorithm aoa (Expand Search)
-
1
Second-order conic programming for data envelopment analysis models
Published 2022“…As far as known, no MATLAB function solves DEA models. Among different types of DEA, this function can handle deterministic, Malmquist index, and stochastic models. …”
Get full text
Get full text
-
2
-
3
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…In this paper we perform a comparative study among GA, SA, and TS. These algorithms have many similarities, but they also possess distinctive features, mainly in their strategies for searching the solution state space. …”
Get full text
article -
4
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …”
Get full text
Get full text
Get full text
article -
5
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
Get full text
-
6
-
7
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
-
8
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
-
9
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
10
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
Get full text
Get full text
Get full text
Get full text
article -
11
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
12
A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs
Published 2024“…Despite this, concerns about the accuracy and function of automated diagnosis remain among patients. …”
Get full text
article -
13
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
Published 2024“…Integrated machine learning algorithms showed that among the 134 mutations reported for these 2 proteins, only 13 and 35 were classified as deleterious mutations in <i>RAF1</i> and <i>RAP1P</i>, respectively. …”
-
14
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
15
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
16
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Further analyses revealed genes associated with the inflammatory response and chemotaxis of myeloid cells, phagocytes, and granulocytes, among the top activated functional categories in BAL from severe COVID-19-affected patients. …”
-
17
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
18
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…Among the “reasons against”, the “value barrier” and “image barrier” come out to be major determinants leading to inhibitions regarding the usage of voice assistants. …”
-
19
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
Get full text
Get full text
-
20
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
Get full text
Get full text
Get full text
article