Search alternatives:
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
develop » developed (Expand Search)
Showing 81 - 100 results of 165 for search '(((( develop robust algorithm ) OR ( elements data algorithm ))) OR ( case finding algorithm ))', query time: 0.11s Refine Results
  1. 81

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
    Get full text
    Get full text
    Get full text
  2. 82

    VEGAWES: variational segmentation on whole exome sequencing for copy number detection by Samreen Anjum (19651882)

    Published 2015
    “…Recently, Whole Exome Sequencing is gaining popularity with copy number variations detection due to low cost and better efficiency. In this work, we developed VEGAWES for accurate and robust detection of copy number variations on WES data. …”
  3. 83

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
  4. 84

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 85

    Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications by Hussie, Abdelazim

    Published 2022
    “…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. …”
    Get full text
  6. 86

    Automated quantification of penile curvature using artificial intelligence by Tariq O. Abbas (11247771)

    Published 2022
    “…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
  7. 87

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
    Get full text
    Get full text
    article
  8. 88

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 89

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
  10. 90
  11. 91
  12. 92

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. The speeded up robust feature (SURF) matching algorithm was utilized in the initial condition sensitivity analysis of the encrypted images. …”
  13. 93

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 94

    ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields by El-Kassar, A. N.

    Published 2005
    “…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 95
  16. 96

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
    Get full text
    Get full text
  17. 97
  18. 98
  19. 99
  20. 100

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”