Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
case finding » cam binding (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
case finding » cam binding (Expand Search)
-
41
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
Published 2013“…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
Get full text
Get full text
Get full text
article -
42
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
43
The effects of data balancing approaches: A case study
Published 2023“…In this research, classification algorithms, combined with resampling strategies and dimensionality reduction methods, were investigated to find a prediction model to correctly identify the samples of treated animals. …”
-
44
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
45
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
-
46
Efficient Prioritization and Processor Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task Scheduling in Cloud Environment
Published 2022“…Our findings also suggest that enhanced versions of the HEFT algorithm perform better than the basic HEFT method in terms of lesser schedule length of the workflow problems running on various virtual machines.…”
-
47
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
Published 2019“…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …”
-
48
-
49
-
50
-
51
-
52
-
53
Applying urban parametric design optimisation processes to a hot climate: Case study of the UAE
Published 2014“…Parametric and algorithmic design is considered a current trend in architectural design processes. …”
Get full text
-
54
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022Get full text
Get full text
Get full text
masterThesis -
55
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
-
56
-
57
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
58
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
-
59
-
60
Optimizing microgrid efficiency: Coordinating commercial and residential demand patterns with shared battery energy storage
Published 2024“…Utilizing a Firefly Algorithm (FA) for optimization, the study determines the optimized BESS capacity for minimum total cost. …”