يعرض 281 - 300 نتائج من 351 نتيجة بحث عن '(((( algorithm a function ) OR ( algorithm its function ))) OR ( algorithm using function ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 281

    Optimization metaheuristic for software testing حسب Mansour, Nashat

    منشور في 2013
    "…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 282

    Heuristics for graph decomposition حسب Mansour, N.

    منشور في 2000
    "…To find a reasonable solution to this intractable problem, we suggest an approximate objective function that can be minimized by heuristic procedures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 283
  4. 284
  5. 285

    Online Control and Optimization of Directional Drilling حسب unknown

    منشور في 2020
    "…A proposed mass spring system was used to represent the phenomena of stick-slip oscillation. …"
    احصل على النص الكامل
    masterThesis
  6. 286

    Anonymizing multimedia documents حسب Haraty, Ramzi

    منشور في 2016
    "…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 287

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  8. 288

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 289

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  10. 290

    Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks حسب Islambouli, Rania

    منشور في 2019
    "…The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 291
  12. 292

    Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing حسب Mohammadreza Gholami (17032317)

    منشور في 2023
    "…To determine the optimized size, a firefly optimization algorithm is used as an efficient meta-heuristic approach. …"
  13. 293

    Scatter search for homology modeling حسب Mansour, Nashat

    منشور في 2016
    "…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 294

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
  15. 295
  16. 296

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators حسب I.S. Elkamash (16810689)

    منشور في 2023
    "…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …"
  17. 297

    Power matching approach for GPS coverage extension حسب Saab, Samer S.

    منشور في 2006
    "…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 298

    GENETIC SCHEDULING OF TASK GRAPHS حسب Benten, M. S.

    منشور في 2020
    "…A genetic algorithm for scheduling computational task graphs is presented. …"
    احصل على النص الكامل
    article
  19. 299

    Design and development of an embedded controller for roboticmanipulator حسب Bakhashwain, J.M.

    منشور في 1998
    "…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 300

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject