Showing 281 - 300 results of 310 for search '(((( algorithm survey function ) OR ( algorithm cost function ))) OR ( algorithm using function ))', query time: 0.11s Refine Results
  1. 281

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif Badran (16888785)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">Extremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown.…”
  2. 282

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  3. 283
  4. 284

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 285

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT by Sait, Sadiq M.

    Published 2006
    “…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
    Get full text
    article
  6. 286

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. Part B demonstrates the application of REBUS in examining a validated tourism model of destination image, satisfaction, and destination loyalty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 287

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics by Abbas Khan (5141000)

    Published 2024
    “…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …”
  8. 288

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  9. 289

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  10. 290
  11. 291
  12. 292

    Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces by Uzair Sajjad (19646296)

    Published 2021
    “…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …”
  13. 293

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…This pilot study aimed to investigate the plasma proteome profile and identify a panel of various protein biomarkers for dementia. We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …”
  14. 294

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  15. 295
  16. 296

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 297

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  18. 298

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  19. 299

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling by Peixoto, Eduardo

    Published 2014
    “…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
    Get full text
    article
  20. 300

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation by Jahed, Karim

    Published 2016
    “…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject