Showing 81 - 100 results of 129 for search '(((( element method algorithms ) OR ( element data algorithm ))) OR ( case finding algorithm ))', query time: 0.12s Refine Results
  1. 81

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
    Get full text
    Get full text
    Get full text
  2. 82

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  3. 83

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  4. 84

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 85

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
  6. 86

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 87

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 88

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  9. 89

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 90

    ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields by El-Kassar, A. N.

    Published 2005
    “…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 91

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  12. 92

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
    Get full text
    Get full text
  13. 93
  14. 94

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  15. 95

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy by El-Ferik, S

    Published 2020
    “…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
    Get full text
    article
  16. 96

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  17. 97

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 98
  19. 99

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 100

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article