Showing 301 - 320 results of 348 for search '(((( algorithm its function ) OR ( algorithm a function ))) OR ( algorithms within function ))', query time: 0.11s Refine Results
  1. 301

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
    Get full text
    Get full text
    article
  2. 302

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 303

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT by Sait, Sadiq M.

    Published 2006
    “…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
    Get full text
    article
  4. 304
  5. 305

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
    Get full text
    Get full text
    article
  6. 306

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …”
  7. 307

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 308

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  9. 309

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 310
  11. 311

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  12. 312

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  13. 313
  14. 314

    Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants by Abouzeid M. Shalaby (16810695)

    Published 2021
    “…<p dir="ltr">In this work, we suggest a new parametrization for the hypergeometric (k+1Fk) approximants introduced by Mera et al. (2015). …”
  15. 315
  16. 316

    An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease” by Naila Rabbani (291722)

    Published 2022
    “…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”
  17. 317

    Artificial intelligence in respiratory care by Manjush Karthika (18384907)

    Published 2024
    “…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”
  18. 318

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 319
  20. 320

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text