Showing 1 - 20 results of 23 for search '(( algorithms among functions ) OR ( algorithm python function ))', query time: 0.09s Refine Results
  1. 1

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…As far as known, no MATLAB function solves DEA models. Among different types of DEA, this function can handle deterministic, Malmquist index, and stochastic models. …”
    Get full text
    Get full text
  2. 2
  3. 3

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…In this paper we perform a comparative study among GA, SA, and TS. These algorithms have many similarities, but they also possess distinctive features, mainly in their strategies for searching the solution state space. …”
    Get full text
    article
  4. 4

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …”
    Get full text
    Get full text
    Get full text
    article
  5. 5

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
    Get full text
  6. 6
  7. 7

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
  8. 8

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  9. 9

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 10

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 11
  12. 12

    A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs by Alabd-Aljabar, Ahmed

    Published 2024
    “…Despite this, concerns about the accuracy and function of automated diagnosis remain among patients. …”
    Get full text
    article
  13. 13

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics by Abbas Khan (5141000)

    Published 2024
    “…Integrated machine learning algorithms showed that among the 134 mutations reported for these 2 proteins, only 13 and 35 were classified as deleterious mutations in <i>RAF1</i> and <i>RAP1P</i>, respectively. …”
  14. 14

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  16. 16

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 by Hibah Shaath (5599658)

    Published 2020
    “…Further analyses revealed genes associated with the inflammatory response and chemotaxis of myeloid cells, phagocytes, and granulocytes, among the top activated functional categories in BAL from severe COVID-19-affected patients. …”
  17. 17
  18. 18

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…Among the “reasons against”, the “value barrier” and “image barrier” come out to be major determinants leading to inhibitions regarding the usage of voice assistants. …”
  19. 19

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  20. 20

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif, Badran

    Published 2022
    “…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
    Get full text
    Get full text
    Get full text
    article