Showing 281 - 300 results of 348 for search '(( algorithm within function ) OR ((( algorithms a function ) OR ( algorithm fa function ))))', query time: 0.11s Refine Results
  1. 281

    Heuristics for graph decomposition by Mansour, N.

    Published 2000
    “…To find a reasonable solution to this intractable problem, we suggest an approximate objective function that can be minimized by heuristic procedures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 282

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS by El-Amin, I.M.

    Published 2020
    “…This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …”
    Get full text
    article
  3. 283

    IMPROVING BER PERFORMANCE OF LDPC CODES BASED ON INTERMEDIATE DECODING RESULTS by Alghonaim, Esa

    Published 2007
    “…The behavior of the BP algorithm is first investigated as a function of number of decoder iterations, and it is shown that typical uncorrected error patterns can be classified into 3 categories: oscillating, nearly-constant, or random-like, with a predominance of oscillating patterns at high Signal-to-Noise (SNR) values. …”
    Get full text
    article
  4. 284

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 285

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
    Get full text
    Get full text
    Get full text
    article
  6. 286
  7. 287

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation by Jahed, Karim

    Published 2016
    “…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 288

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 289

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…Determining a protein’s structure is a challenging goal in structural bioinformatics, offering important insight towards understanding the function of a protein. …”
    Get full text
    Get full text
    masterThesis
  10. 290

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…SA evolves a solution by minimizing a function that is based on the contradictory objectives of coverage of events, diversity of events covered, and definite continuity of events. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 291

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
    Get full text
    Get full text
    Get full text
    article
  12. 292

    IoT-Based Sustainable Parking Lot by Binmahfooz, Abdullah

    Published 2023
    “…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
    Get full text
    article
  13. 293

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 294

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …”
    Get full text
    Get full text
    Get full text
    article
  15. 295

    On the parameterized parallel complexity and the vertex cover problem by Abu-Khzam, Faisal N.

    Published 2016
    “…For a problem to be in FPPT, it should possess an efficient parallel algorithm not only from a theoretical standpoint but in practice as well. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 296

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
  17. 297
  18. 298

    Shuffled Linear Regression with Erroneous Observations by Saab, Samer S.

    Published 2019
    “…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 299
  20. 300

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”