يعرض 301 - 320 نتائج من 351 نتيجة بحث عن '(( ((algorithm a) OR (algorithm its)) function ) OR ( algorithm using function ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 301
  2. 302

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics حسب Naila Rabbani (291722)

    منشور في 2022
    "…In this review, I describe the utility of AGEomics biomarkers and provide evidence why these are close to the phenotype of a condition or disease compared to other metabolites and metabolomic approaches and how to train and test algorithms for clinical diagnostic and screening applications with high accuracy, sensitivity and specificity using machine learning approaches.…"
  3. 303

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 304

    Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2012
    "…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 305

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms حسب Ezzine, J.

    منشور في 1995
    "…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 306

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials حسب Ghouti, Lahouari

    منشور في 1997
    "…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
    احصل على النص الكامل
    masterThesis
  7. 307

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 308

    Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants حسب Abouzeid M. Shalaby (16810695)

    منشور في 2021
    "…Accurate results have been obtained in using a relatively low order from the perturbation series. …"
  9. 309

    Software defect prediction. (c2019) حسب Moussa, Rebecca

    منشور في 2019
    "…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 310

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …"
  11. 311
  12. 312

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT حسب Sait, Sadiq M.

    منشور في 2006
    "…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …"
    احصل على النص الكامل
    article
  13. 313

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…To examine the hypothesized relationship, a quantitative approach employing PLS-SEM was utilized to evaluate a representative sample of 1189 Indian consumers and examining the psychological and functional constructs leading to adoption intention for voice assistants. …"
  14. 314

    IMPROVING BER PERFORMANCE OF LDPC CODES BASED ON INTERMEDIATE DECODING RESULTS حسب Alghonaim, Esa

    منشور في 2007
    "…The behavior of the BP algorithm is first investigated as a function of number of decoder iterations, and it is shown that typical uncorrected error patterns can be classified into 3 categories: oscillating, nearly-constant, or random-like, with a predominance of oscillating patterns at high Signal-to-Noise (SNR) values. …"
    احصل على النص الكامل
    article
  15. 315

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 316

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing حسب Xin Li (51274)

    منشور في 2020
    "…Subsequently, we propose a method to measure the cost-effectiveness of allocated resources and energy savings, named value density function. …"
  17. 317

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 318

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition حسب Abboud, Ralph

    منشور في 2019
    "…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 319

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 320

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article