Search alternatives:
algorithm graft » algorithm goa (Expand Search)
graft function » heart function (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
algorithm graft » algorithm goa (Expand Search)
graft function » heart function (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
-
261
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
262
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
263
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis -
264
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
265
Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing
Published 2020“…Subsequently, we propose a method to measure the cost-effectiveness of allocated resources and energy savings, named value density function. …”
-
266
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
267
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
268
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
269
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …”
Get full text
Get full text
Get full text
article -
270
-
271
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…., linear quadratic regulator with the sequential quadratic programming (LSQP) and sliding mode control with SQP (SSQP). A tailored multi-term reward function is structured to penalize excessive yaw rate error, sideslip angle, tire slip deviations beyond peak grip regions, and power losses based on a realistic electric machine efficiency map. …”
-
272
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
273
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
274
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
275
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
Published 2022“…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”
-
276
Artificial intelligence in respiratory care
Published 2024“…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”
-
277
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
278
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
279
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
280
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article