Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
tool using » tools using (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
tool using » tools using (Expand Search)
element » elements (Expand Search)
-
41
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
42
A fast exact sequential algorithm for the partial digest problem
Published 2016“…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
-
43
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
44
A parallel GPU implementation of the timber wolf placement algorithm
Published 2015“…This paper describes the implementation of the Timber Wolf placement algorithm using CUDA and demonstrates the applicability of GPUs in accelerating electronic design automation tools. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
45
-
46
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…All the experiments were conducted using the pitch-catch method in presence of surface damages on head of the Rail track. …”
Get full text
-
47
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017“…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
48
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
49
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…For fair comparisons, a parameter tuning tool named irace is used to automatically configure the parameters of all 15 algorithms. …”
-
50
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…It affects their customer service level, therefore, it is crucial to manage the scheduling of the financial data supply chain to elevate the efficiency of banking sectors’ performance. The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
51
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
52
-
53
-
54
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…The research is concluded with a conclusion section which recapitulates the results obtained and observations with regards to the current detection mechanisms and the applied machine learning algorithms. The recommendation section emphasizes the steps that can be taken and improvements to the existing methodologies and tools used in the prevention and detection of financial crimes.…”
Get full text
-
55
-
56
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
57
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
58
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
-
59
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…This is addressed such that the genetic algorithm (GA) technique is used for selecting the best features and the artificial neural network (ANN) classifier is applied for fault diagnosis. …”
-
60
Revolutionizing sustainable supply chain management: A review of metaheuristics
Published 2023“…The paper also identifies the key factors that influence the success of using metaheuristics for SSCM, such as the choice of algorithm, problem complexity, and data quality. …”
Get full text