Showing 261 - 280 results of 310 for search '(((( algorithm survey function ) OR ( algorithm cost function ))) OR ( algorithm using function ))', query time: 0.12s Refine Results
  1. 261

    IoT-Based Sustainable Parking Lot by Binmahfooz, Abdullah

    Published 2023
    “…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
    Get full text
    article
  2. 262

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
  3. 263

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
    Get full text
    Get full text
    article
  4. 264

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 265

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 266

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators by I.S. Elkamash (16810689)

    Published 2023
    “…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …”
  7. 267

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  8. 268

    Design of a TE-pass reflection mode optical polarizer by Khan, M.A.

    Published 2003
    “…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. The analysis of the filter is carried out numerically using the method of lines with a perfectly matched layer in order to absorb the radiative field. …”
    Get full text
    Get full text
    article
  9. 269

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  10. 270

    Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants by Abouzeid M. Shalaby (16810695)

    Published 2021
    “…Since strong-coupling behavior is not yet known for the renormalization group functions of the O(N)-symmetric φ 4 theory, we used weak-coupling and largeorder parametrization to resum the seven-loop critical exponents ν, η and ω for N = 0, 1, 2, 3, 4. …”
  11. 271

    A novel network-based SIS framework for improved GA performance by Tohme, Rawane

    Published 2025
    “…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 272

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 273

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet by Imran Siddique (12705185)

    Published 2024
    “…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …”
  14. 274
  15. 275

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  16. 276
  17. 277

    Wiener-Hammerstein Model Identification-Recursive lgorithms by Emara-Shabaik, Husam

    Published 2020
    “…These algorithms are derived on the basis of minimizing cost functions of the output errors, the equation errors, and the prediction errors. …”
    Get full text
    article
  18. 278

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif, Badran

    Published 2022
    “…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
    Get full text
    Get full text
    Get full text
    article
  19. 279

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
    Get full text
    Get full text
    article
  20. 280

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”