Search alternatives:
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element per » elementi per (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element per » elementi per (Expand Search)
-
761
Optimizing clopidogrel dose response
Published 2016“…A clinical-pharmacogenetic algorithm was developed based on whether clopidogrel shows 1) expected effect as per indication, 2) little or no effect, or 3) clinical features that patients experience and fit with clopidogrel adverse drug reactions. …”
Get full text
Get full text
Get full text
Get full text
article -
762
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…This adaptation is illustrated for the bi-objective Minimum Weighted Vertex Cover Problem (MWVCP). In this work, a simple and effective bi-objective GRASP algorithm for the MWVCP is developed in the first stage. …”
-
763
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
Published 2022“…Machine learning (ML) algorithms have been used as an objective tool in screening or diagnosing voice disorders. …”
-
764
Indoor Localization Based on Floor Plans and Power Maps
Published 2015“…An indoor localization algorithm that is based on fingerprinting and trilateration is developed. …”
Get full text
Get full text
Get full text
conferenceObject -
765
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
Get full text
Get full text
Get full text
Get full text
article -
766
-
767
Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem
Published 2025“…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
-
768
-
769
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
770
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
771
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
772
An optimal stochastic multivariable PID controller
Published 2019“…The system under consideration needs not be stable. A recursive algorithm providing optimal time-varying PID gains is proposed for the case where the number of inputs is larger than or equal to the number of outputs. …”
Get full text
Get full text
Get full text
Get full text
article -
773
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
774
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
Published 2022“…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. …”
-
775
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
-
776
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
Published 2023“…<p dir="ltr">Autism Spectrum Disorder (ASD) is a common neurodevelopmental disorder in children. …”
-
777
An aspect-oriented framework for systematic security hardening of software
Published 2008“…We realize our proposition by integrating into the GCC compiler few features described in the SHL weaving semantics and developing a demonstrative case study…”
Get full text
Get full text
Get full text
masterThesis -
778
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The denoising methodology comprises a computational algorithm to identify significant features in a high-dimensional vector of observations containing white Gaussian noise. …”
Get full text
Get full text
Get full text
Get full text
article -
779
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
780
Anonymizing multimedia documents
Published 2016“…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article