User profiles for Mehdi Mrad
Mehdi MradFull Professor of Operations Research, University of Tunis Verified email at essect.u-tunis.tn Cited by 370 |
SARS-CoV2 RT-PCR assays: In vitro comparison of 4 WHO approved protocols on clinical specimens and its implications for real laboratory practice through variant …
M Gdoura, I Abouda, M Mrad, I Ben Dhifallah, Z Belaiba… - Virology Journal, 2022 - Springer
Introduction RT-PCR testing on nasopharyngeal swabs is a key component in the COVID-19
fighting, provided to use sensitive and specific SARS-CoV2 genome targets. In this study, …
fighting, provided to use sensitive and specific SARS-CoV2 genome targets. In this study, …
The first exome wide association study in Tunisia: identification of candidate loci and pathways with biological relevance for type 2 diabetes
…, I Gouiza, M Gharbi, W Kammoun, M Mrad… - Frontiers in …, 2023 - frontiersin.org
Introduction Type 2 diabetes (T2D) is a multifactorial disease involving genetic and
environmental components. Several genome-wide association studies (GWAS) have been …
environmental components. Several genome-wide association studies (GWAS) have been …
The Role of Dietary Intake in Type 2 Diabetes Mellitus: Importance of Macro and Micronutrients in Glucose Homeostasis
The prevalence of Type 2 diabetes (T2D) is increasing worldwide. Genetics and lifestyle,
especially diet, are contributing factors. Analyses of macro- and micronutrient intake across …
especially diet, are contributing factors. Analyses of macro- and micronutrient intake across …
An arc-flow model for the makespan minimization problem on identical parallel machines
In this paper, we consider the basic makespan minimization problem on identical parallel
machines. The aim of this study is to solve, to optimality the hard instances of the literature. We …
machines. The aim of this study is to solve, to optimality the hard instances of the literature. We …
Optimal consumed electric energy while sequencing vehicle trips in a personal rapid transit transportation system
M Mrad, L Hidri - Computers & Industrial Engineering, 2015 - Elsevier
In this paper, we address the problem of minimizing the consumed electric energy for a personal
rapid transit transportation system, in order to fulfil a planned list of trips, performed by a …
rapid transit transportation system, in order to fulfil a planned list of trips, performed by a …
A branch-and-price algorithm for the two-stage guillotine cutting stock problem
We investigate the two-stage guillotine two-dimensional cutting stock problem. This problem
commonly arises in the industry when small rectangular items need to be cut out of large …
commonly arises in the industry when small rectangular items need to be cut out of large …
Multiallelic rare variants in BBS genes support an oligogenic ciliopathy in a non-obese juvenile-onset syndromic diabetic patient: a case report
H Dallali, N Kheriji, W Kammoun, M Mrad… - Frontiers in …, 2021 - frontiersin.org
Juvenile-onset diabetes may occur in the context of a rare syndromic presentation, suggesting
a monogenic etiology rather than a common multifactorial diabetes. In the present study, …
a monogenic etiology rather than a common multifactorial diabetes. In the present study, …
Risk assessment for discrete stochastic time-cost-quality trade-off problem using simulation-based integer linear programming approach
Time, quality and cost are the most critical performance indicators in project management. It
has always been considered a tough challenge for project managers to optimize them …
has always been considered a tough challenge for project managers to optimize them …
Tight lower bounds for the Traveling Salesman Problem with draft limits
In the present paper, we consider the Traveling Salesman Problem with Draft Limits (TSPDL),
which is a variant of the Traveling Salesman Problem (TSP) arising in maritime …
which is a variant of the Traveling Salesman Problem (TSP) arising in maritime …
System survivability in the context of interdiction networks
We define the concept of network survivability in the context of defense/attack strategies. We
assume that a network is threatened by attackers. The attacker is referred to as a leader that …
assume that a network is threatened by attackers. The attacker is referred to as a leader that …