بدائل البحث:
"algorithm performs" » "algorithm perform" (توسيع البحث), "algorithm performed" (توسيع البحث)
"algorithm performs" » "algorithm perform" (توسيع البحث), "algorithm performed" (توسيع البحث)
-
1
Transform Domain LMS/F Algorithms, Performance Analysis and Applications
منشور في 2020احصل على النص الكامل
masterThesis -
2
-
3
EFFICIENT ALGORITHM FOR WEINBERGER ARRAY FOLDING
منشور في 2020"…THis paper describes an algorithm for folding weinberger arrays. The algorithm performs column and row ordering and tehn column folding. …"
احصل على النص الكامل
article -
4
An efficient method for the open-shop scheduling problem using simulated annealing
منشور في 2016"…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
5
Bee colony algorithm for assigning proctors to exams. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
6
Particle swarm optimization approach for protein structure prediction in the 3D HP model
منشور في 2012"…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. Our algorithm performs better than previous algorithms by finding lower energy structures or by performing fewer numbers of energy evaluations.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
7
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. The algorithm performs a neighborhood search combined with a random search to balance exploration and exploitation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
A Graph Heuristic Approach for the Data Path Allocation Problem
منشور في 2022"…The results show that the algorithm performs well while generating sub-optimal solutions.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
9
Tracking and repairing damaged healthcare databases using the matrix
منشور في 2015"…The results of this work prove that our algorithm performs better than the other algorithms in both the damage assessment and the recovery stages.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
10
-
11
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
منشور في 2021"…The obtained results proved that the proposed algorithm performs well while classifying textual and non-textual region with better accuracy than benchmark state-of-the-art algorithms.…"
-
12
Metaheuristic Optimization‐Based Sliding Mode Control With Modified Perturb and Observe for Controlling MPPT of a PV Interfaced Grid Connected System
منشور في 2025"…The suggested approach looks for every maximum point across a lengthy number of cycles to find the global maximum point after introducing (MGO‐MPb&O), and the results of the MATLAB/Simulink show that the algorithm performs well under the arbitrary changes of the physical parameters of the proposed system and ambient scenario. …"
-
13
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
منشور في 2023"…The results show that the performance of the newly proposed EBCM algorithm performs similarly to the 4 compared algorithms and has the same properties and behaviors, such as convergence, diversity, exploration and exploitation trade-offs, in many aspects. …"
-
14
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021"…It is critical to assess this algorithm's performance in comparison with other well-known heuristic methods. …"
احصل على النص الكامل
احصل على النص الكامل
-
15
Whale optimization algorithm: analysis and full survey
منشور في 2024"…The survey further discusses the algorithm's performance on a wide range of optimization problems, showcasing its competitiveness and effectiveness. …"
احصل على النص الكامل
-
16
An optimal stochastic multivariable PID controller
منشور في 2019"…Simulation results are included to illustrate the performance capabilities of the proposed algorithm. Performance comparison with an optimal stochastic iterative learning control scheme, an optimal PID controller, an adaptive PID controller, and a recent optimal stochastic PID controller are also included.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
Using C++ to Calculate SO(10) Tensor Couplings
منشور في 2021"…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. This paper outlines the details of such software, implemented in C++ using in-built libraries. …"
احصل على النص الكامل
article -
18
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
منشور في 2013"…It is also tested for the case when more information, beyond nearest neighbors, is made available; here, we test its operation for different numbers of step look-ahead. We verify algorithm performance by means of simulations, whereby navigational paths are calculated for different radiation fields.…"
احصل على النص الكامل
article -
19
Toward automatic motivator selection for autism behavior intervention therapy
منشور في 2022"…Analysis of the algorithm performance showed promising results and indicated improvement of the recommendations over time.…"
احصل على النص الكامل
احصل على النص الكامل
-
20
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. Moreover we studied the vulnerability of such attacks on two of the most famous security devices used for access-restricted sites; which is known as “Biometric devices”. …"
احصل على النص الكامل