Search alternatives:
algorithm within » algorithm its (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm within » algorithm its (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
281
Heuristics for graph decomposition
Published 2000“…To find a reasonable solution to this intractable problem, we suggest an approximate objective function that can be minimized by heuristic procedures. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
282
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
Published 2020“…This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …”
Get full text
article -
283
IMPROVING BER PERFORMANCE OF LDPC CODES BASED ON INTERMEDIATE DECODING RESULTS
Published 2007“…The behavior of the BP algorithm is first investigated as a function of number of decoder iterations, and it is shown that typical uncorrected error patterns can be classified into 3 categories: oscillating, nearly-constant, or random-like, with a predominance of oscillating patterns at high Signal-to-Noise (SNR) values. …”
Get full text
article -
284
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
285
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
Get full text
Get full text
Get full text
article -
286
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
287
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
288
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
289
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…Determining a protein’s structure is a challenging goal in structural bioinformatics, offering important insight towards understanding the function of a protein. …”
Get full text
Get full text
masterThesis -
290
Optimization metaheuristic for software testing
Published 2013“…SA evolves a solution by minimizing a function that is based on the contradictory objectives of coverage of events, diversity of events covered, and definite continuity of events. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
291
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
292
IoT-Based Sustainable Parking Lot
Published 2023“…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
Get full text
article -
293
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
294
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …”
Get full text
Get full text
Get full text
article -
295
On the parameterized parallel complexity and the vertex cover problem
Published 2016“…For a problem to be in FPPT, it should possess an efficient parallel algorithm not only from a theoretical standpoint but in practice as well. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
296
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
-
297
-
298
Shuffled Linear Regression with Erroneous Observations
Published 2019“…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
299
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
300
Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants
Published 2022“…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”