يعرض 261 - 280 نتائج من 303 نتيجة بحث عن '(( algorithm using function ) OR ((( algorithms within function ) OR ( algorithm goa function ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 261

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 262

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet حسب Imran Siddique (12705185)

    منشور في 2024
    "…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …"
  3. 263

    Software defect prediction. (c2019) حسب Moussa, Rebecca

    منشور في 2019
    "…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 264
  5. 265

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  6. 266
  7. 267

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif, Badran

    منشور في 2022
    "…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 268

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms حسب Ezzine, J.

    منشور في 1995
    "…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 269

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
  10. 270

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif Badran (16888785)

    منشور في 2022
    "…<h3>Background</h3><p dir="ltr">Extremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown.…"
  11. 271

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  12. 272
  13. 273

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition حسب Abboud, Ralph

    منشور في 2019
    "…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 274

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT حسب Sait, Sadiq M.

    منشور في 2006
    "…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …"
    احصل على النص الكامل
    article
  15. 275

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. Part B demonstrates the application of REBUS in examining a validated tourism model of destination image, satisfaction, and destination loyalty. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 276

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics حسب Abbas Khan (5141000)

    منشور في 2024
    "…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …"
  17. 277

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 278

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 279
  20. 280