Search alternatives:
most function » cost function (Expand Search), taste function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
-
1
Iterative Least Squares Functional Networks Classifier
Published 2007“…The performance of this new intelligent systems scheme is demonstrated and examined using real-world applications. A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …”
Get full text
Get full text
article -
2
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
3
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…The performance of the RBFN is compared with a standard AC load flow algorithm…”
Get full text
Get full text
article -
4
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
5
From Collatz Conjecture to chaos and hash function
Published 2023“…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
6
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
7
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
8
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
-
10
New enumeration algorithm for regular boolean functions
Published 2018“…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. Most widely known algorithms of this category are genetic algorithms (GA). …”
Get full text
article -
12
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…In this paper, a multiswarm-intelligence-based algorithm (MSIA) is developed to cope with bound constrained functions. …”
-
13
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
15
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
16
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
17
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…We assume a hypercube multicomputer architecture in most experiments. …”
Get full text
Get full text
Get full text
article -
18
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
19
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
20
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text