يعرض 221 - 240 نتائج من 348 نتيجة بحث عن '(( algorithms a function ) OR ( algorithm taste function ))*', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 221
  2. 222

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics حسب Naila Rabbani (291722)

    منشور في 2022
    "…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …"
  3. 223

    Simultaneous stabilisation of power systems using geneticalgorithms حسب Abdel-Magid, Y.L.

    منشور في 1997
    "…The problem of selecting the parameters of a power system stabiliser which simultaneously stabilises this set of plants is converted to a simple optimisation problem which is solved by a genetic algorithm and an eigenvalue-based objective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 224

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …"
  5. 225

    Iterative heuristics for multiobjective VLSI standard cellplacement حسب Sait, Sadiq M.

    منشور في 2001
    "…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 226

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING حسب Sait, Sadiq M.

    منشور في 2020
    "…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…"
    احصل على النص الكامل
    article
  7. 227

    General iterative heuristics for VLSI multiobjective partitioning حسب Sait, Sadiq M.

    منشور في 2003
    "…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 228

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks حسب Abbas, Nadine

    منشور في 2018
    "…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 229

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 230
  11. 231
  12. 232

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 233
  14. 234

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability حسب Abd-El-barr, Mostafa

    منشور في 2003
    "…Fault tolerance is an important network design aspect. A fault tolerant network is able to function even in the presence of some faults in the network. …"
    احصل على النص الكامل
    article
  15. 235

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle حسب Reza Jafari (3494018)

    منشور في 2025
    "…., linear quadratic regulator with the sequential quadratic programming (LSQP) and sliding mode control with SQP (SSQP). A tailored multi-term reward function is structured to penalize excessive yaw rate error, sideslip angle, tire slip deviations beyond peak grip regions, and power losses based on a realistic electric machine efficiency map. …"
  16. 236

    The maximum common subgraph problem حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…The result is an algorithm whose run time is bounded by a function exponential in the order of the smaller cover rather than in the order of the smaller graph.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 237

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 238

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 239

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia حسب Hanan Ehtewish (17149825)

    منشور في 2023
    "…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …"
  20. 240

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article