بدائل البحث:
using function » using fusion (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
its function » cost function (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
its function » cost function (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
-
281
Optimization metaheuristic for software testing
منشور في 2013"…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
282
Heuristics for graph decomposition
منشور في 2000"…To find a reasonable solution to this intractable problem, we suggest an approximate objective function that can be minimized by heuristic procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
283
-
284
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
285
Online Control and Optimization of Directional Drilling
منشور في 2020"…A proposed mass spring system was used to represent the phenomena of stick-slip oscillation. …"
احصل على النص الكامل
masterThesis -
286
Anonymizing multimedia documents
منشور في 2016"…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
287
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
288
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
منشور في 2016"…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
289
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
290
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
منشور في 2019"…The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
291
Blood Glucose Regulation Modelling and Intelligent Control
منشور في 2024احصل على النص الكامل
doctoralThesis -
292
Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing
منشور في 2023"…To determine the optimized size, a firefly optimization algorithm is used as an efficient meta-heuristic approach. …"
-
293
Scatter search for homology modeling
منشور في 2016"…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
294
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
-
295
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
296
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
منشور في 2023"…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …"
-
297
Power matching approach for GPS coverage extension
منشور في 2006"…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
298
GENETIC SCHEDULING OF TASK GRAPHS
منشور في 2020"…A genetic algorithm for scheduling computational task graphs is presented. …"
احصل على النص الكامل
article -
299
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …"
احصل على النص الكامل
احصل على النص الكامل
article -
300
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject