Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
system » systems (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
system » systems (Expand Search)
-
921
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
-
922
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
-
923
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
924
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis -
925
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
926
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
927
-
928
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
-
929
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
930
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
931
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
Published 2022“…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …”
-
932
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…An optimal efficiency calculator provides optimum flux and torque producing current, while a supervisory control eliminates the intricate boot-strap effect of the flux-torque loop. A model reference-based adaptive speed controller guarantees quick speed response and robustness of the drive system. …”
Get full text
Get full text
article -
933
An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids
Published 2020“…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
-
934
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…Many FS-based swarm intelligence algorithms have been used to tackle FS. However, the door is still open for further investigations since no FS method gives cutting-edge results for all cases. …”
-
935
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
936
Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid
Published 2022“…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …”
-
937
-
938
Scrambled Prime Key Encryption
Published 2018“…To enhance data security different cryptographic algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
939
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
-
940
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject