-
241
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
242
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
243
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
244
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
245
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
Published 2023“…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …”
-
246
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
247
Design of adaptive arrays based on element position perturbations
Published 1993“…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
248
Design of a TE-pass reflection mode optical polarizer
Published 2003“…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. The analysis of the filter is carried out numerically using the method of lines with a perfectly matched layer in order to absorb the radiative field. …”
Get full text
Get full text
article -
249
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
250
IoT-Based Sustainable Parking Lot
Published 2023“…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
Get full text
article -
251
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
252
Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants
Published 2021“…Since strong-coupling behavior is not yet known for the renormalization group functions of the O(N)-symmetric φ 4 theory, we used weak-coupling and largeorder parametrization to resum the seven-loop critical exponents ν, η and ω for N = 0, 1, 2, 3, 4. …”
-
253
A novel network-based SIS framework for improved GA performance
Published 2025“…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
Get full text
Get full text
Get full text
masterThesis -
254
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
255
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
Published 2024“…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …”
-
256
Software defect prediction. (c2019)
Published 2019“…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
masterThesis -
257
Power matching approach for GPS coverage extension
Published 2006Get full text
Get full text
Get full text
Get full text
article -
258
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
259
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
260
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
Get full text
Get full text
Get full text
article