Showing 81 - 100 results of 130 for search '(( alignment novel algorithm ) OR ((( data code algorithm ) OR ( case finding algorithm ))))', query time: 0.11s Refine Results
  1. 81

    A MIMO Sampling-Rate-Dependent Controller by Saab, Samer S.

    Published 2014
    “…An analytic approach for finding the parameters of the SRD controller that guarantees reference output trajectory tracking is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 82

    Data Generation for Path Testing by Mansour, Nashat

    Published 2004
    “…We present two stochastic search algorithms for generating test cases that execute specified paths in a program. …”
    Get full text
    Get full text
    Get full text
    article
  3. 83

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 84

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
    Get full text
    Get full text
    article
  5. 85

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
    Get full text
    Get full text
    Get full text
  6. 86

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 87

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 88

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 89

    ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields by El-Kassar, A. N.

    Published 2005
    “…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 90

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  11. 91

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
    Get full text
    Get full text
  12. 92

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy by El-Ferik, S

    Published 2020
    “…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
    Get full text
    article
  13. 93

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  14. 94
  15. 95

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  16. 96
  17. 97

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  18. 98

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  19. 99

    Image Local Features Description Through Polynomial Approximation by Fawad - (17018015)

    Published 2019
    “…The rotation invariance is achieved by aligning the local patch around the Harris corner through the dominant orientation shift algorithm. …”
  20. 100

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”