يعرض 281 - 295 نتائج من 295 نتيجة بحث عن '(( algorithm fa function ) OR ( algorithm using function ))*', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 281

    Condenser capacity and hyperbolic perimeterImage 1 حسب Mohamed M.S., Nasser

    منشور في 2021
    "…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 282

    Condenser capacity and hyperbolic perimeter حسب Mohamed M.S. Nasser (16931772)

    منشور في 2022
    "…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …"
  3. 283

    H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling حسب Peixoto, Eduardo

    منشور في 2014
    "…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …"
    احصل على النص الكامل
    article
  4. 284

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation حسب Jahed, Karim

    منشور في 2016
    "…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 285
  6. 286

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 287

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …"
  8. 288

    Copy number variations in the genome of the Qatari population حسب Khalid A. Fakhro (3158862)

    منشور في 2015
    "…The four call-sets were integrated to identify high confidence CNV regions, which were subsequently annotated for putative functional effect and compared to public databases of CNVs in other populations. …"
  9. 289

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 حسب Hibah Shaath (5599658)

    منشور في 2020
    "…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …"
  10. 290

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …"
  11. 291

    The architecture of a highly reconfigurable RISC dataflow array processor حسب Sait, Sadiq M.

    منشور في 2020
    "…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
    احصل على النص الكامل
    article
  12. 292
  13. 293

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…Unlike standard machine learning approaches such as PCA, LDA, SVM, RF, GBM etc, DeepRaman functions independently, requiring no human interaction, and can be used to much smaller datasets than traditional CNNs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 294

    IoT-Based Sustainable Parking Lot حسب Binmahfooz, Abdullah

    منشور في 2023
    "…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …"
    احصل على النص الكامل
    article
  15. 295

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes حسب Radhakrishnan Vishnubalaji (3563306)

    منشور في 2023
    "…Mechanistically, targeted depletion of ENO1 and FDPS halted TNBC cell proliferation, colony formation, and organoid tumor growth under 3-dimensional conditions and increased cell death, suggesting their potential use as novel therapeutic targets for TNBC. Differential expression and gene set enrichment analysis in TNBC revealed enrichment in the cycle and mitosis functional categories in FDPShigh, while ENO1high was associated with numerous functional categories, including cell cycle, glycolysis, and ATP metabolic processes. …"