يعرض 261 - 280 نتائج من 295 نتيجة بحث عن '(((( algorithm used function ) OR ( algorithm sma function ))) OR ( algorithm using function ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 261

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet حسب Imran Siddique (12705185)

    منشور في 2024
    "…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …"
  2. 262

    Design of a TE-pass reflection mode optical polarizer حسب Khan, M.A.

    منشور في 2003
    "…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. The analysis of the filter is carried out numerically using the method of lines with a perfectly matched layer in order to absorb the radiative field. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 263
  4. 264

    Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2012
    "…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 265

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 266

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 267

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 268

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition حسب Abboud, Ralph

    منشور في 2019
    "…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 269

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side حسب Ali Sharida (17947847)

    منشور في 2024
    "…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …"
  10. 270
  11. 271

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
  12. 272

    Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces حسب Uzair Sajjad (19646296)

    منشور في 2021
    "…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …"
  13. 273

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  14. 274

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia حسب Hanan Ehtewish (17149825)

    منشور في 2023
    "…This pilot study aimed to investigate the plasma proteome profile and identify a panel of various protein biomarkers for dementia. We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …"
  15. 275
  16. 276
  17. 277

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics حسب Abbas Khan (5141000)

    منشور في 2024
    "…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …"
  18. 278
  19. 279

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling حسب Peixoto, Eduardo

    منشور في 2014
    "…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …"
    احصل على النص الكامل
    article
  20. 280

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"