Showing 341 - 352 results of 352 for search '(( algorithm machine function ) OR ( ((algorithm using) OR (algorithms a)) function ))', query time: 0.10s Refine Results
  1. 341

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 342

    IMPROVING BER PERFORMANCE OF LDPC CODES BASED ON INTERMEDIATE DECODING RESULTS by Alghonaim, Esa

    Published 2007
    “…The behavior of the BP algorithm is first investigated as a function of number of decoder iterations, and it is shown that typical uncorrected error patterns can be classified into 3 categories: oscillating, nearly-constant, or random-like, with a predominance of oscillating patterns at high Signal-to-Noise (SNR) values. …”
    Get full text
    article
  3. 343

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …”
    Get full text
    Get full text
    Get full text
    article
  4. 344

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side by Ali Sharida (17947847)

    Published 2024
    “…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …”
  5. 345

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes by Radhakrishnan Vishnubalaji (3563306)

    Published 2023
    “…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
  6. 346

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing by Xin Li (51274)

    Published 2020
    “…Subsequently, we propose a method to measure the cost-effectiveness of allocated resources and energy savings, named value density function. …”
  7. 347
  8. 348

    Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System by Alaa Altawallbeh (22565837)

    Published 2025
    “…Through systematic eigenvalue analysis and parameter sensitivity studies, complemented by time-domain verification in MATLAB/SIMULINK, we demonstrate the decisive influence of VSG control parameters on low-frequency oscillation (LFO) damping characteristics, transient frequency stability metrics, including the rate of change of frequency (ROCOF), maximum frequency deviation (<i>fnadir</i>), overshoot, and settling time. We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …”
  9. 349

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB by Alice AbdelAleem (17753799)

    Published 2023
    “…Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …”
  10. 350
  11. 351

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  12. 352