Search alternatives:
algorithm sine » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
algorithm sine » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
-
281
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
Get full text
Get full text
Get full text
article -
282
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
Get full text
Get full text
article -
283
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
284
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…<h3>Background</h3><p dir="ltr">Extremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown.…”
-
285
Large language models for code completion: A systematic literature review
Published 2024“…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
286
A quadratic kernel for 3-set packing
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
287
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
Get full text
Get full text
Get full text
Get full text
article -
288
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
Published 2006“…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
Get full text
article -
289
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. Part B demonstrates the application of REBUS in examining a validated tourism model of destination image, satisfaction, and destination loyalty. …”
Get full text
Get full text
Get full text
Get full text
article -
290
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
291
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
292
-
293
-
294
Platoon Transitional Maneuver Control System: A Review
Published 2021“…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …”
-
295
Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side
Published 2024“…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …”
-
296
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
297
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
298
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
299
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
300
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject