بدائل البحث:
both function » cost function (توسيع البحث)
most function » cost function (توسيع البحث), taste function (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
its function » cost function (توسيع البحث)
both function » cost function (توسيع البحث)
most function » cost function (توسيع البحث), taste function (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
its function » cost function (توسيع البحث)
-
1
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
-
3
-
4
-
5
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
6
Iterative Least Squares Functional Networks Classifier
منشور في 2007"…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
8
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021"…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …"
احصل على النص الكامل
احصل على النص الكامل
-
9
New enumeration algorithm for regular boolean functions
منشور في 2018"…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
11
Mobile robots obstacles avoidance using dynamic window approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
12
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …"
-
13
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
-
14
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
منشور في 2022"…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …"
احصل على النص الكامل
-
15
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
منشور في 2019"…The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …"
-
16
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
منشور في 2023"…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
احصل على النص الكامل
-
17
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …"
-
18
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
منشور في 2024"…The overlay structure – a unique logical tree – used to control access to the critical section maintains its consistency even when nodes fail. An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …"
-
19
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
-
20
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013احصل على النص الكامل
doctoralThesis