يعرض 281 - 300 نتائج من 306 نتيجة بحث عن '(( ((algorithm its) OR (algorithm goa)) function ) OR ( algorithm using function ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 281

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 282
  3. 283
  4. 284

    Platoon Transitional Maneuver Control System: A Review حسب Sareh Badnava (16891374)

    منشور في 2021
    "…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …"
  5. 285
  6. 286

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side حسب Ali Sharida (17947847)

    منشور في 2024
    "…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …"
  7. 287

    Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces حسب Uzair Sajjad (19646296)

    منشور في 2021
    "…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …"
  8. 288

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …"
  9. 289

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia حسب Hanan Ehtewish (17149825)

    منشور في 2023
    "…This pilot study aimed to investigate the plasma proteome profile and identify a panel of various protein biomarkers for dementia. We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …"
  10. 290

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
    احصل على النص الكامل
    احصل على النص الكامل
  11. 291

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 292

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants حسب Mohannad N. Khandakji (13885434)

    منشور في 2022
    "…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …"
  13. 293

    Condenser capacity and hyperbolic perimeterImage 1 حسب Mohamed M.S., Nasser

    منشور في 2021
    "…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 294

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  15. 295

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling حسب Peixoto, Eduardo

    منشور في 2014
    "…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …"
    احصل على النص الكامل
    article
  16. 296

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation حسب Jahed, Karim

    منشور في 2016
    "…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 297
  18. 298

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 299

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …"
  20. 300

    Copy number variations in the genome of the Qatari population حسب Khalid A. Fakhro (3158862)

    منشور في 2015
    "…The four call-sets were integrated to identify high confidence CNV regions, which were subsequently annotated for putative functional effect and compared to public databases of CNVs in other populations. …"