بدائل البحث:
using function » using fusion (توسيع البحث)
algorithm etc » algorithm its (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm etc » algorithm its (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
-
261
Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants
منشور في 2021"…Since strong-coupling behavior is not yet known for the renormalization group functions of the O(N)-symmetric φ 4 theory, we used weak-coupling and largeorder parametrization to resum the seven-loop critical exponents ν, η and ω for N = 0, 1, 2, 3, 4. …"
-
262
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
منشور في 2025"…Unlike standard machine learning approaches such as PCA, LDA, SVM, RF, GBM etc, DeepRaman functions independently, requiring no human interaction, and can be used to much smaller datasets than traditional CNNs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
263
Axes-Based Encryption Key
منشور في 2018"…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
264
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
منشور في 2024"…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …"
-
265
Software defect prediction. (c2019)
منشور في 2019"…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
266
-
267
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
268
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
269
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
270
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
منشور في 1995"…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…"
احصل على النص الكامل
احصل على النص الكامل
article -
271
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
منشور في 2024"…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
-
272
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…<h3>Background</h3><p dir="ltr">Extremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown.…"
-
273
Large language models for code completion: A systematic literature review
منشور في 2024"…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
274
A quadratic kernel for 3-set packing
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
275
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
منشور في 2006"…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …"
احصل على النص الكامل
article -
276
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
منشور في 2016"…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. Part B demonstrates the application of REBUS in examining a validated tourism model of destination image, satisfaction, and destination loyalty. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
277
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
منشور في 2024"…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …"
-
278
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
279
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
280