Search alternatives:
algorithm basis » algorithm analysis (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
algorithm basis » algorithm analysis (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
-
1
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
2
A fuzzy basis function network for generator excitation control
Published 1997“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
Get full text
Get full text
article -
3
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
4
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
-
5
Adaptive step-size sign least mean squares
Published 2004“…A powerful adaptation scheme is used to adapt the step-size of the sign function inside the recursion of the sign algorithm. …”
Get full text
Get full text
article -
6
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
7
Tracking analysis of normalized adaptive algorithms
Published 2003“…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
Get full text
Get full text
article -
8
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
9
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
10
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
11
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
Get full text
Get full text
article -
12
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
13
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
14
A new tabu search algorithm for the long-term hydro scheduling problem
Published 2002“…The proposed implementation contributes to the enhancement of speed and convergence of the original tabu search algorithm (TSA). A significant reduction in the objective function over previous classical optimization methods and a simulated annealing algorithm has been achieved. …”
Get full text
Get full text
article -
15
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
Published 2020“…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …”
Get full text
article -
16
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The overall cost function has been developed using fuzzy logic. Several variants of the algorithm are proposed and compared together via simulation and experimental results are provided. r 2002 Elsevier Science Ltd. …”
Get full text
article -
17
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The overall cost function has been developed using fuzzy logic. Several variants of the algorithm are proposed and compared together via simulation and experimental results are provided. r 2002 Elsevier Science Ltd. …”
Get full text
article -
18
Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash
Published 2022“…In this way, an augmented function (Lagrange function) is formulated which serves as the basis for the equations that govern phase equilibrium. …”
-
19
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
Published 2006“…In the optimization procedure a performance index is developed to reflect the minimum speed deviation, minimum settling time and zero steady-state error. A radial basis function network (RBFN) is utilized for online tuning of the PI controller parameters to ensure optimum drive performance under different disturbances. …”
Get full text
article -
20
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
Get full text