Showing 161 - 180 results of 348 for search '(( algorithm protein function ) OR ((( algorithm fa function ) OR ( algorithm a function ))))', query time: 0.11s Refine Results
  1. 161

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
  2. 162
  3. 163

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
  4. 164

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. But the identification of lncRNAs is an important task to discover their functional role in species. …”
  5. 165
  6. 166
  7. 167

    Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme by Sudhanshu Ranjan (17151115)

    Published 2021
    “…System responses have been critically analyzed under Mine Blast Algorithm (MBA) based proportional–integral–derivative (PID) controllers</p><h2>Other Information</h2><p dir="ltr">Published in: Energy Reports<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2021.10.100" target="_blank">https://dx.doi.org/10.1016/j.egyr.2021.10.100</a></p>…”
  8. 168

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  9. 169

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Malware, or malicious software, poses a significant threat to systems and networks. Malware attacks are becoming extremely sophisticated, and the ability to detect and prevent them is becoming more challenging. …”
    Get full text
    article
  10. 170
  11. 171

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 172

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  13. 173

    A modified optimal design of a vibration absorber for ground motion isolation by Issa, Jimmy S.

    Published 2014
    “…In this work, the unique optimal absorber parameters are determined with the aim of minimizing the maximum of the primary system amplitude. For a given stiffness ratio of the system, the optimal mass and damping ratios are obtained analytically using an optimization method based on invariant points of the objective function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 174
  15. 175
  16. 176

    Particle swarm optimization for multimachine power systemstabilizer design by Abido, A.A.

    Published 2001
    “…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
    Get full text
    Get full text
    article
  17. 177

    Parallel tabu search in a heterogeneous environment by Al-Yamani, A.

    Published 2003
    “…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
    Get full text
    Get full text
    article
  18. 178

    A quadratic kernel for 3-set packing by Abu-Khzam, Faisal N.

    Published 2017
    “…We present a reduction procedure that takes an arbitrary instance of the 3-Set Packing problem and produces an equivalent instance whose number of elements is bounded by a quadratic function of the input parameter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 179

    Platoon Transitional Maneuver Control System: A Review by Sareh Badnava (16891374)

    Published 2021
    “…These benefits can be realized through vehicle platooning. A vehicle platoon is composed of a group of connected automated vehicles (CAVs) traveling together at consensual speed, following the leading vehicle (leader) while maintaining a prespecified inter-vehicle distance. …”
  20. 180