Showing 441 - 460 results of 602 for search '(( elements network algorithm ) OR ((( data code algorithm ) OR ( based model algorithm ))))', query time: 0.14s Refine Results
  1. 441

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 442

    Robustness evaluation of real-Time Protocols by Tarhini, Abbas

    Published 2006
    “…In this paper, we suggest a methodology for measuring the degree of robustness for Real-Time Component-Based Systems (RTCBS). Each component of the RTCBS system is modeled as a Timed Labeled Transition System (TLTS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 443
  4. 444

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …”
    Get full text
    Get full text
    masterThesis
  5. 445

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…This paper proposes a prototype model of a smart digital-stethoscope system to monitor patient’s heart sounds and diagnose any abnormality in a real-time manner. …”
  6. 446

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  7. 447
  8. 448

    A new method of analysis for slender columns by Zdenek, P.

    Published 1991
    “…The method is compared with the AC} moment magnification method and with the CEB model column method based on moment-curvature relations. …”
    Get full text
    Get full text
    article
  9. 449

    Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care by Regina Padmanabhan (14231606)

    Published 2022
    “…Hence, for predicting three critical clinical complications, such as sepsis, the presence of multidrug-resistant organisms, and mortality, from the data available from medical records, we used 1166 febrile neutropenia episodes reported in 513 patients. The XGboost algorithm is suggested from 10-fold cross-validation on 6 candidate models. …”
  10. 450

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…We provide a general keyword query model allowing the user to choose the results’ semantic coverage and expressiveness based on her needs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 451

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…In this thesis, dynamic modeling of two different DSS were developed and optimized using different control and optimization techniques. …”
    Get full text
    masterThesis
  12. 452

    Online dynamic ensemble deep random vector functional link neural network for forecasting by Ruobin Gao (16003195)

    Published 2023
    “…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). …”
  13. 453

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
  14. 454
  15. 455

    Thermal convection of fluid in fractured media by Sfeir, Abdallah

    Published 1995
    “…The computational algorithm is based on the differences between the rates of convective and conductive heat transfers. …”
    Get full text
    Get full text
    Get full text
    article
  16. 456
  17. 457

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 458

    An Adaptive Sliding Mode Control for a Dual Active Bridge Converter With Extended Phase Shift Modulation by Farzaneh Bagheri (17947811)

    Published 2023
    “…The conventional single-phase shift (SPS) modulation-based DAB converter is known to be inefficient. Hence, an optimization algorithm based on the Lagrange multiplier method (LMM) is proposed to minimize both backflow power and inductor current stress simultaneously. …”
  19. 459

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. This preconditioner, denoted as Block CPR (BCPR), is specifically designed for Lagrange multipliers-based flow models, such as those generated by Mixed Hybrid Finite Element (MHFE) approximations. …”
  20. 460

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject