Showing 21 - 40 results of 5,420 for search 'may algorithm', query time: 0.12s Refine Results
  1. 21
  2. 22
  3. 23

    Molecular Beacon Sequence Design Algorithm by W. Todd Monroe, Frederick R. Haselton

    Published 2003-01-01
    “…For smaller laboratories where molecular beacons are not the focus of research, the public domain algorithm described here may be usefully employed to aid in molecular beacon design.…”
    Get full text
    Article
  4. 24

    Nonvariational ADAPT algorithm for quantum simulations by Ho Lun Tang, Yanzhu Chen, Prakriti Biswas, Alicia B. Magann, Christian Arenz, Sophia E. Economou

    Published 2025-06-01
    “…We compare this nonvariational algorithm with ADAPT-VQE and with feedback-based quantum algorithms in terms of the rate of energy reduction, the circuit depth, and the measurement cost in molecular simulation. …”
    Get full text
    Article
  5. 25

    Algorithms for representations of quiver Yangian algebras by Dmitry Galakhov, Alexei Gavshin, Alexei Morozov, Nikita Tselousov

    Published 2024-08-01
    “…Moreover, these algorithms may be generalized to toroidal and elliptic algebras and exploited in various numerical experiments with those algebras. …”
    Get full text
    Article
  6. 26

    Korselt Numbers Through Computational Algorithms by Khalid Adarbeh, Hadi Hamad, Abeer Eshtaya

    Published 2023-12-01
    “…Finally, many notes have been taken and directed us to build and develop a number of complicated algorithms, some of them in order to find Korselt sets for relatively large numbers in an effective way in a short time which may require a great time and need tedious effort if it is to be calculated manually…”
    Get full text
    Article
  7. 27

    An Effective Genetic Algorithm for Mixed Precision by Wanyu Zhang, Yu Shang, Min Tsao, Yiwei Li, Xiaoyu Song

    Published 2025-01-01
    “…In this paper, we present a genetic algorithm-based approach for tuning the precision of floating-point computations. …”
    Get full text
    Article
  8. 28

    Applications of Machine Learning Algorithms in Geriatrics by Adrian Stancu, Cosmina-Mihaela Rosca, Emilian Marian Iovanovici

    Published 2025-08-01
    “…The integration of machine learning (ML)-type algorithms in geriatrics represents a direction for optimizing prevention, diagnosis, prediction, monitoring, and treatment. …”
    Get full text
    Article
  9. 29

    A SEARCHING ALGORITHM FOR TEXT WITH MISTAKES by S. Nasr, O. V. German

    Published 2020-03-01
    “…The paper contains a new text searching method representing modification of the Boyer-Moore algorithm and enabling a user to find the places in the text where the given substring occurs maybe with possible errors, that is the string in text and a query may not coincide but nevertheless are identical. …”
    Get full text
    Article
  10. 30

    Surgical Therapeutic Algorithm in Facial Paralysis by Andreea GROSU-BULARDA, Razvan Nicolae TEODOREANU, Serban Arghir POPESCU, Flavia Francesca LITA, Florin-Vlad HODEA, Andrei CRETU, Stefan CACIOR, Mihaela-Cristina ANDREI, Cristian Sorin HARIGA, Ioan LASCAR

    Published 2022-12-01
    “…Given the complex multitude of causes that may generate such condition, a therapeutic algorithm is mandatory when attempting reconstruction. …”
    Get full text
    Article
  11. 31

    Algorithm for analyzing randomness in point patterns by Tony Sampaio, Jorge Rocha, Cláudia M. Viana, Silvana Camboin, Fábio Marcelo Breunig, Edenilson Nascimento, Elaine de Cacia de Lima Frick

    Published 2025-06-01
    “…However, what is deemed ``random'’ in point spatial patterns may be influenced by socio-environmental factors such as wetlands or transportation networks. …”
    Get full text
    Article
  12. 32
  13. 33
  14. 34

    A modern conception of postcholecystectomy syndrome (based on the materials of the Advisory Board held on May 4, 2019 in Almaty, Kazakhstan) by A. V. Nersesov, D. A. Kaibullaeva, O. S. Vasnev, L. K. Tashenova, M. M. Sakhipov, G. T. Berestimov, G. A. Akhmetzhanova, O. T. Ibekenov, M. O. Doskhanov, N. M. Zhumazhanov, Zh. M. Balzhanov, B. A. Aitmoldin, E. A. Toleubaev, E. M. Laryushina, K. N. Zhumagulov, G. N. Sobirova, S. I. Umarova, Yu. O. Shulpekova, A. V. Okhlobystin

    Published 2020-08-01
    “…The Advisory Board was held on May 4, 2019, in Almaty (Kazakhstan) to re-estimate the definitions and categories related to the issue of the postcholecystectomy syndrome and to develop the diagnostic and treatment algorithm for patients with the postcholecystectomy dysfunction of the sphincter of Oddi. …”
    Get full text
    Article
  15. 35
  16. 36

    Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems by Riyam Noori Jawad, Faez Hassan Ali

    Published 2020-06-01
    “…This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. …”
    Get full text
    Article
  17. 37

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…However, limitations arise from the NB algorithm’s independence assumption, which may affect performance in more complex spam scenarios. …”
    Get full text
    Article
  18. 38

    Negative Selection Algorithm for Unsupervised Anomaly Detection by Michał Bereta

    Published 2024-11-01
    “…In this work, we present a modification of the well-known Negative Selection Algorithm (NSA), inspired by the process of T-cell generation in the immune system. …”
    Get full text
    Article
  19. 39

    Metaheuristic Algorithms for Optimization: A Brief Review by Vinita Tomar, Mamta Bansal, Pooja Singh

    Published 2024-03-01
    “…As a result, metaheuristics have become an increasingly important part of modern optimization, with a large number of algorithms emerging over the last two decades. The purpose of this study is to present a quick overview of these algorithms so that researchers may choose and use the best metaheuristic method for their optimization issues. …”
    Get full text
    Article
  20. 40

    Video watermarking algorithm for resisting collusion attacks by LIU Shao-hui, HAN Lu, YAO Hong-xun

    Published 2010-01-01
    “…Moreover the mechanism of JND(just-noticeable distortion) was used to adjust the embedding strength of proposed algorithm. These components may be then used as building blocks to construct a self-adaptive content dependent spread spectrum watermark solution. …”
    Get full text
    Article