يعرض 341 - 352 نتائج من 352 نتيجة بحث عن '(( algorithm machine function ) OR ( ((algorithms a) OR (algorithm using)) function ))', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 341

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 342

    IMPROVING BER PERFORMANCE OF LDPC CODES BASED ON INTERMEDIATE DECODING RESULTS حسب Alghonaim, Esa

    منشور في 2007
    "…The behavior of the BP algorithm is first investigated as a function of number of decoder iterations, and it is shown that typical uncorrected error patterns can be classified into 3 categories: oscillating, nearly-constant, or random-like, with a predominance of oscillating patterns at high Signal-to-Noise (SNR) values. …"
    احصل على النص الكامل
    article
  3. 343

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 344

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side حسب Ali Sharida (17947847)

    منشور في 2024
    "…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …"
  5. 345

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes حسب Radhakrishnan Vishnubalaji (3563306)

    منشور في 2023
    "…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
  6. 346

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing حسب Xin Li (51274)

    منشور في 2020
    "…Subsequently, we propose a method to measure the cost-effectiveness of allocated resources and energy savings, named value density function. …"
  7. 347
  8. 348

    Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System حسب Alaa Altawallbeh (22565837)

    منشور في 2025
    "…Through systematic eigenvalue analysis and parameter sensitivity studies, complemented by time-domain verification in MATLAB/SIMULINK, we demonstrate the decisive influence of VSG control parameters on low-frequency oscillation (LFO) damping characteristics, transient frequency stability metrics, including the rate of change of frequency (ROCOF), maximum frequency deviation (<i>fnadir</i>), overshoot, and settling time. We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …"
  9. 349

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB حسب Alice AbdelAleem (17753799)

    منشور في 2023
    "…Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …"
  10. 350
  11. 351

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
    احصل على النص الكامل
    احصل على النص الكامل
  12. 352