بدائل البحث:
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
algorithm also » algorithm a (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
also function » cost function (توسيع البحث)
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
algorithm also » algorithm a (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
also function » cost function (توسيع البحث)
-
1
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …"
-
2
Evolution Of Activation Functions for Neural Architecture Search
منشور في 2020"…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
3
Scatter Search algorithm for Protein Structure Prediction
منشور في 2016"…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
4
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
5
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…In this paper we perform a comparative study among GA, SA, and TS. These algorithms have many similarities, but they also possess distinctive features, mainly in their strategies for searching the solution state space. …"
احصل على النص الكامل
article -
6
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
-
7
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
منشور في 2023"…Generally, the inventors attribute the novelties of these new algorithms to inspirations from either biology, human behaviors, physics, or other phenomena. …"
-
8
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
منشور في 2023"…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
احصل على النص الكامل
-
9
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
منشور في 2020"…A fitness function is constructed from the total operating cost of the generating units without penalty terms. …"
احصل على النص الكامل
article -
10
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
احصل على النص الكامل
احصل على النص الكامل
-
11
-
12
-
13
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
-
14
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
منشور في 2024"…Moreover, experimental results also reveal a graceful degradation of algorithm performance. …"
-
15
-
16
-
17
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013احصل على النص الكامل
doctoralThesis -
18
Salp swarm algorithm: survey, analysis, and new applications
منشور في 2024"…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
احصل على النص الكامل
-
19
Scatter search for protein structure prediction. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis