Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
case finding » cam binding (Expand Search)
Showing 61 - 80 results of 113 for search '(( elements network algorithm ) OR ((( data encoding algorithm ) OR ( case finding algorithm ))))', query time: 0.10s Refine Results
  1. 61
  2. 62

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  3. 63

    A MIMO Sampling-Rate-Dependent Controller by Saab, Samer S.

    Published 2014
    “…An analytic approach for finding the parameters of the SRD controller that guarantees reference output trajectory tracking is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 64

    Data Generation for Path Testing by Mansour, Nashat

    Published 2004
    “…We present two stochastic search algorithms for generating test cases that execute specified paths in a program. …”
    Get full text
    Get full text
    Get full text
    article
  5. 65

    A new approach and faster exact methods for the maximum common subgraph problem by Abu-Khzam, Faisal N.

    Published 2017
    “…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 66

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
    Get full text
    Get full text
    Get full text
  7. 67

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
  8. 68

    Evacuation of a highly congested urban city by El Khoury, John

    Published 2017
    “…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 69
  10. 70

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
    Get full text
    article
  11. 71

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 72

    ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields by El-Kassar, A. N.

    Published 2005
    “…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 73

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches by Abdulla Alhajeri, Rashed

    Published 2020
    “…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
    Get full text
    Get full text
  14. 74
  15. 75

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy by El-Ferik, S

    Published 2020
    “…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
    Get full text
    article
  16. 76

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article
  17. 77

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  18. 78

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
  19. 79
  20. 80