Search alternatives:
algorithm cost » algorithm goa (Expand Search), algorithm its (Expand Search)
algorithm aoa » algorithm goa (Expand Search), algorithm fa (Expand Search), algorithm _ (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm its (Expand Search)
algorithm aoa » algorithm goa (Expand Search), algorithm fa (Expand Search), algorithm _ (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
301
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
302
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
Published 2006“…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
Get full text
article -
303
-
304
Design of adaptive arrays based on element position perturbations
Published 1993“…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
Get full text
Get full text
article -
305
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …”
-
306
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
307
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
308
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article -
309
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
310
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
311
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
312
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
313
Practical Considerations in Frequency Diverse Array Radar Signal Processing
Published 2021Get full text
doctoralThesis -
314
Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants
Published 2021“…<p dir="ltr">In this work, we suggest a new parametrization for the hypergeometric (k+1Fk) approximants introduced by Mera et al. (2015). …”
-
315
-
316
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
Published 2022“…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”
-
317
Artificial intelligence in respiratory care
Published 2024“…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”
-
318
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
319
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis -
320
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …”