بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
event modeling » agent modeling (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
event modeling » agent modeling (توسيع البحث)
element » elements (توسيع البحث)
-
1
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…In this paper, we contribute a new formulation of the proxy behavior derived from a model for approximate conformance checking. By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
2
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. The state-of-the-art output from streaming confor mance checking is a prefix-alignment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
3
-
4
-
5
An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication
منشور في 2019"…Of late, within the ambit of control of systems over networks, event-triggered control has proved to be instrumental in ensuring acceptable closed-loop performance while respecting bandwidth constraints of the underlying network. Aligned with these design objectives, a robust event-triggered attitude control algorithm is proposed to regulate the orientation of a flexible spacecraft subjected to parametric uncertainties, external disturbances, and vibrations due to flexible appendages. …"
-
6
-
7
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
احصل على النص الكامل
article -
8
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
9
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
10
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
11
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
12
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…Online conformance checking deals with finding discrepancies be tween real-life and modeled behavior on data streams. The current state-of-the-art output of online conformance checking is a prefix alignment, which is used for pinpointing the exact deviations in terms of the trace and the model while accommodating a trace’s unknown termination in an online setting. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
13
The Use of Microwave Tomography in Bone Healing Monitoring
منشور في 2019احصل على النص الكامل
doctoralThesis -
14
-
15
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
16
Generic metadata representation framework for social-based event detection, description, and linkage
منشور في 2020"…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
Prediction of EV Charging Behavior Using Machine Learning
منشور في 2021"…Therefore, in this paper we propose the usage of historical charging data in conjunction with weather, traffic, and events data to predict EV session duration and energy consumption using popular machine learning algorithms including random forest, SVM, XGBoost and deep neural networks. …"
احصل على النص الكامل
article -
18
-
19
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
منشور في 2015"…To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. Our algorithm optimizes the initial poor alignments, generated by a dynamic programming method. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
A kernelization algorithm for d-Hitting Set
منشور في 2010"…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article