بدائل البحث:
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
most function » taste function (توسيع البحث)
algorithm its » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
most function » taste function (توسيع البحث)
-
1
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
-
3
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
منشور في 2024"…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …"
احصل على النص الكامل
-
4
-
5
-
6
-
7
-
8
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
9
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021"…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …"
احصل على النص الكامل
احصل على النص الكامل
-
10
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
منشور في 2022"…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). …"
-
11
-
12
-
13
-
14
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
15
Economic load dispatch using memetic sine cosine algorithm
منشور في 2022"…The results show that the performance of the SCA-βHC algorithm is increased by tuning its parameters in proper value. …"
احصل على النص الكامل
-
16
Mobile robots obstacles avoidance using dynamic window approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
17
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
منشور في 2023"…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. The optimization is applied to a formulated cost function that considers uncertainty, false alarms, and existing clutters. …"
احصل على النص الكامل
-
18
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …"
-
19
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
-
20
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …"