Showing 301 - 320 results of 321 for search '(( algorithm machine function ) OR ((( algorithm using function ) OR ( algorithm cost function ))))', query time: 0.10s Refine Results
  1. 301
  2. 302

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 303

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT by Sait, Sadiq M.

    Published 2006
    “…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
    Get full text
    article
  4. 304

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. Part B demonstrates the application of REBUS in examining a validated tourism model of destination image, satisfaction, and destination loyalty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 305

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  6. 306

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  7. 307
  8. 308
  9. 309

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  10. 310
  11. 311

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  12. 312

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  13. 313

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation by Jahed, Karim

    Published 2016
    “…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 314

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 315

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
    Get full text
    Get full text
    Get full text
    article
  16. 316

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …”
  17. 317
  18. 318

    Copy number variations in the genome of the Qatari population by Khalid A. Fakhro (3158862)

    Published 2015
    “…The four call-sets were integrated to identify high confidence CNV regions, which were subsequently annotated for putative functional effect and compared to public databases of CNVs in other populations. …”
  19. 319

    Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19 by Hibah Shaath (5599658)

    Published 2020
    “…Herein, we employed iterative clustering and guide-gene selection 2 (ICGS2) as well as uniform manifold approximation and projection (UMAP) dimensionality reduction computational algorithms to decipher the complex immune and cellular composition of BAL, using publicly available datasets from a total of 68,873 single cells derived from two healthy subjects, three patients with mild COVID-19, and five patients with severe COVID-19. …”
  20. 320

    The architecture of a highly reconfigurable RISC dataflow array processor by Sait, Sadiq M.

    Published 2020
    “…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …”
    Get full text
    article