Search alternatives:
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
develop » developed (Expand Search)
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
case finding » cam binding (Expand Search)
develop » developed (Expand Search)
-
81
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
Get full text
Get full text
Get full text
-
82
VEGAWES: variational segmentation on whole exome sequencing for copy number detection
Published 2015“…Recently, Whole Exome Sequencing is gaining popularity with copy number variations detection due to low cost and better efficiency. In this work, we developed VEGAWES for accurate and robust detection of copy number variations on WES data. …”
-
83
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
-
84
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
85
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
Published 2022“…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. …”
Get full text
-
86
Automated quantification of penile curvature using artificial intelligence
Published 2022“…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
-
87
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
Get full text
Get full text
article -
88
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
89
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
-
90
Comparative Study of Control Strategies for Under Actuated Manipulator
Published 2006Get full text
doctoralThesis -
91
-
92
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. The speeded up robust feature (SURF) matching algorithm was utilized in the initial condition sensitivity analysis of the encrypted images. …”
-
93
Recovery of business intelligence systems
Published 2018“…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
Get full text
Get full text
Get full text
Get full text
article -
94
ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields
Published 2005“…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
Get full text
Get full text
Get full text
Get full text
article -
95
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
Published 2015Get full text
doctoralThesis -
96
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
Published 2020“…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
Get full text
Get full text
-
97
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
98
Bootstrap-based Aggregations and their Stability in Feature Selection
Published 2022Get full text
doctoralThesis -
99
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
100
From Collatz Conjecture to chaos and hash function
Published 2023“…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”