Showing 81 - 90 results of 90 for search '(((( selected control algorithm ) OR ( elements means algorithm ))) OR ( source code algorithm ))', query time: 0.09s Refine Results
  1. 81

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
    Get full text
    Get full text
    Get full text
    article
  2. 82

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  3. 83
  4. 84

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”
  5. 85

    Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018) by Tay, Bilal M.

    Published 2018
    “…The proposed scheme is capable of assessing the deployed access control polices and updating them systematically with new roles based on employees behaviors and system constraints. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 86
  7. 87

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
  8. 88

    Urinary Metabolomic Markers of Protein Glycation, Oxidation, and Nitration in Early-Stage Decline in Metabolic, Vascular, and Renal Health by Jinit Masania (7164239)

    Published 2019
    “…In 2-step analysis, algorithms combining subject age, BMI, and urinary N<em>ε</em>-fructosyl-lysine and valine discriminated between healthy controls and impaired health (any type), accuracy of 78%, and then between types of health impairment with accuracy of 69%-78% (<em>cf.…”
  9. 89

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
  10. 90