بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
case finding » cam binding (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
case finding » cam binding (توسيع البحث)
element » elements (توسيع البحث)
-
81
A new approach and faster exact methods for the maximum common subgraph problem
منشور في 2017"…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
82
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
83
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
84
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
احصل على النص الكامل
-
85
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
منشور في 2024"…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…"
-
86
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
87
Evacuation of a highly congested urban city
منشور في 2017"…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
88
Recovery of business intelligence systems
منشور في 2018"…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
89
ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields
منشور في 2005"…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
90
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
91
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
منشور في 2020"…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …"
احصل على النص الكامل
احصل على النص الكامل
-
92
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
منشور في 2020"…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …"
احصل على النص الكامل
article -
93
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
94
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
-
95
Anomaly Detection Based Framework for Profile Monitoring
منشور في 2023احصل على النص الكامل
doctoralThesis -
96
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
97
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The primary purpose of the Blockchain Consent Algorithm (BCA) is to find solutions for numerous unreliable nodes with varying hash values. …"
-
98
An efficient method for the open-shop scheduling problem using simulated annealing
منشور في 2016"…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
99
QoS-driven multicast tree generation using tabu search
منشور في 2020"…Results show that on almost all test cases, TS algorithm exhibits more intelligent search of the solution subspace and is able to find better solutions than other reported multicast algorithms.…"
احصل على النص الكامل
article -
100
The maximum common subgraph problem
منشور في 2017"…With its plethora of applications, MCS is a familiar and challenging problem. Many algorithms exist that can deliver optimal MCS solutions, but whose asymptotic worst-case run times fail to do better than mere brute-force, which is exponential in the order of the smaller graph. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject