نتایج جستجو برای: consuming and computationally expensive alternatively

تعداد نتایج: 16831158  

2012
Mostafa Herajy Monika Heiner

Computational steering is an interactive remote control of a long running application. The user can adopt it, e.g., to adjust simulation parameters on the fly. Simulation of large-scale biochemical networks is often computationally expensive, particularly stochastic and hybrid simulation. Such extremely time-consuming computations necessitate an interactive mechanism to permit users to try diff...

2002
ZhanPing Liu Robert James Moorhead

UFLIC (Unsteady Flow Line Integral Convolution) is an effective texture synthesis technique to visualize unsteady flow with enhanced temporal coherence, but it is time-consuming to generate. This paper presents an accelerated algorithm, called AUFLIC (Accelerated UFLIC), to speed up the UFLIC generation. Our algorithm saves, re-uses, and updates pathlines in the value scattering processes. A fl...

2001
Yaochu Jin Markus Olhofer Bernhard Sendhoff

Approximate models have to be used in evolutionary optimization when the original fitness function is computationally very expensive. Unfortunately, the convergence property of the evolutionary algorithm is unclear when an approximate model is used for fitness evaluation because approximation errors are involved in the model. What is worse, the approximate model may introduce false optima that ...

2013
Damián Pérez-Alfonso Raykenler Yzquierdo-Herrera Manuel Lazo-Cortés Damián Pérez Raykenler Yzquierdo Manuel Lazo

Process mining techniques extract knowledge from event logs of information systems. Process discovery is a process mining category, focused on discovering process models. The applicability and effectiveness of process discovery algorithms depend on event log’s features. Selecting the right algorithms is a tough task due to the variety of variables involved and the complexity of obtaining logs f...

2013
Ankur Singhal Vikas Mittal

Fingerprint verification is one of the most reliable personal identification methods and it plays a very important role in forensic and civilian applications. Security systems are now computerized. Automated security systems are essential now. These days most of the banking transactions, use of cell phones and personal digital assistants (PDAs) are frequently performed. However, manual fingerpr...

2014
Richard Osborne Alan R. Aronson K. Bretonnel Cohen

The MIMIC II database contains 1,237,686 clinical documents of various kinds. A common task for researchers working with this database is to run MetaMap, which uses the UMLS Metathesaurus, on those documents to identify specific semantic types of entities mentioned in them. However, this task is computationally expensive and time-consuming. Research in many groups could be accelerated if there ...

2011
Zalinda Othman Sarah Behnam

—Competitive global markets oblige the firms to reduce their overall costs while maintaining the same customer service level and this can be achieved just through a precise and efficient management of their supply chain network. The Fixed Charge Transportation Problem (FCTP) which is a more comprehensive type of Transportation Problem (TP) has several applications from different aspects in this...

2014
Yong-Bin Kang Jeff Z. Pan Shonali Krishnaswamy Wudhichart Sawangphol Yuan-Fang Li

For expressive ontology languages such as OWL 2 DL, classification is a computationally expensive task— 2NEXPTIME-complete in the worst case. Hence, it is highly desirable to be able to accurately estimate classification time, especially for large and complex ontologies. Recently, machine learning techniques have been successfully applied to predicting the reasoning hardness category for a give...

2017
Yash Shah Deepak Sehgal Jayaraman K Valadi

The importance to develop effective alternatives to known antibiotics due to increased microbial resistance is gaining momentum in recent years. Therefore, it is of interest to predict, design and computationally model Antimicrobial Peptides (AMPs). AMPs are oligopeptides with varying size (from 5 to over100 residues) having key role in innate immunity. Thus, the potential exploitation of AMPs ...

Journal: :Computers & Geosciences 2015
J. Padarian Budiman Minasny Alex B. McBratney

A digital soil mapping exercise over a large extent and at a high resolution is a computationally expensive procedure. It may take days or weeks to obtain the final maps and to visually evaluate the prediction models when using a desktop workstation. To increase the speed of time-consuming procedures, the use of supercomputers is a common practice. Google has developed a product specifically de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید