Search alternatives:
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
-
1
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …”
-
2
From Collatz Conjecture to chaos and hash function
Published 2023“…The results obtained from the comparative analysis highlight the superiority of the proposed hash function over existing alternatives, validating its potential as a robust solution for various cryptographic applications.…”
-
3
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…A distinguishing feature of this approach lies in its departure from the reliance on geometric methods that are characteristic of Voronoi-based approaches; hence it can be implemented more simply. …”
-
5
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
6
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
7
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
Published 2017“…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …”
-
8
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
9
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
10
-
11
-
12
-
13
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …”
-
14
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…The overlay structure – a unique logical tree – used to control access to the critical section maintains its consistency even when nodes fail. An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …”
-
15
-
16
-
17
-
18
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
19
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
Published 2022“…The best solutions adopted in this situation are often based on optimization algorithms that generate the controller’s gains in each period where there is an internal or external perturbation, adapting the behaviors of the PID against the system’s nonlinearity. …”
-
20
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis