Search alternatives:
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
g algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
element g » elements _ (Expand Search), clement k (Expand Search)
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
g algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
element g » elements _ (Expand Search), clement k (Expand Search)
-
1
-
2
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…Given a graph G = (V, E), a clique is a complete subgraph in G. …”
Get full text
Get full text
article -
3
-
4
-
5
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
6
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
7
-
8
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…In addition, we implement this 3CCED algorithm in the heuristic approach and compare the experiments to Cluster Editing and 2CCED. …”
Get full text
Get full text
Get full text
masterThesis -
9
-
10
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
11
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
12
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
13
A hybrid approach for XML similarity
Published 2007“…Owing to an unparalleled increasing use of the XML standard, developing efficient techniques for comparing XML-based documents becomes essential in information retrieval (IR) research. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In certain penetration events the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
15
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
16
-
17
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In certain penetration events it is proposed that the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
article -
18
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
Published 2025Get full text
doctoralThesis -
19
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …”
-
20
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis