Search alternatives:
algorithm within » algorithm its (Expand Search)
value function » taste function (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
algorithm within » algorithm its (Expand Search)
value function » taste function (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
-
1
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…Each iteration in the algorithm consists of a single Newton step followed by a reduction in the value of the penalty parameter. …”
Get full text
article -
2
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
3
From Collatz Conjecture to chaos and hash function
Published 2023“…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
-
4
Scatter Search algorithm for Protein Structure Prediction
Published 2016“…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
Get full text
Get full text
Get full text
article -
5
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…Since we use Multi-objects to track, the Joint Probability Distribution Function (JPDA) estimates the best measurement values with a preset gating threshold. …”
Get full text
-
6
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Several algorithms have been proposed in the literature for synthesis of multiple valued logic functions. …”
Get full text
Get full text
article -
7
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
8
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
Published 2020“…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …”
Get full text
article -
9
Adaptive step-size sign least mean squares
Published 2004“…A powerful adaptation scheme is used to adapt the step-size of the sign function inside the recursion of the sign algorithm. …”
Get full text
Get full text
article -
10
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
11
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
12
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
13
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
Published 2023“…The proposed RSA-SSA employed Otsu’s variance class function to get the best threshold values at each level. …”
Get full text
-
14
Computational evluation of protein energy functions
Published 2014“…Predicting these structures is guided by the requirement of minimizing the energy value associated with the protein structure. However, the energy functions proposed so far by biophysicists and biochemists are still in the exploration phase and their usefulness has been demonstrated only individually. …”
Get full text
Get full text
Get full text
conferenceObject -
15
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
16
Tracking analysis of normalized adaptive algorithms
Published 2003“…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
Get full text
Get full text
article -
17
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
-
18
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
20
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”