Showing 281 - 300 results of 352 for search '(( algorithm machine function ) OR ((( algorithm using function ) OR ( algorithms a function ))))', query time: 0.12s Refine Results
  1. 281

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
    Get full text
    Get full text
    article
  2. 282

    Fragment based protein structure prediction. (c2013) by Terzian, Meghrig Ohanes

    Published 2016
    “…In addition, it demonstrates the advantage of using the CHARMM36 energy model. The method is based on a two-phase Scatter Search metaheuristic that minimizes the energy function. …”
    Get full text
    Get full text
    masterThesis
  3. 283

    Optimal shunt compensators at nonsinusoidal busbars by El-Amin, I.M.

    Published 1995
    “…This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …”
    Get full text
    Get full text
    article
  4. 284

    Fast force-directed/simulated evolution hybrid for multiobjective VLSI cell placement by Sait, Sadiq M.

    Published 2004
    “…In this work, a fast hybrid algorithm is designed to address this problem. …”
    Get full text
    Get full text
    article
  5. 285
  6. 286
  7. 287

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …”
    Get full text
    article
  8. 288
  9. 289

    Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility by Islambouli, Rania

    Published 2019
    “…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 290

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 291

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 292
  13. 293

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 294

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…A proposed mass spring system was used to represent the phenomena of stick-slip oscillation. …”
    Get full text
    masterThesis
  15. 295
  16. 296

    Heuristics for graph decomposition by Mansour, N.

    Published 2000
    “…To find a reasonable solution to this intractable problem, we suggest an approximate objective function that can be minimized by heuristic procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 297

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
  18. 298

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 299

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 300

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article