Search alternatives:
algorithm within » algorithm its (Expand Search)
where function » heart function (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
algorithm within » algorithm its (Expand Search)
where function » heart function (Expand Search)
algorithm step » algorithm its (Expand Search), algorithm sma (Expand Search), algorithm survey (Expand Search)
step function » taste function (Expand Search)
-
1
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
2
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
3
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
4
Adaptive step-size sign least mean squares
Published 2004“…A powerful adaptation scheme is used to adapt the step-size of the sign function inside the recursion of the sign algorithm. …”
Get full text
Get full text
article -
5
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
6
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
7
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
Get full text
-
8
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
9
From Collatz Conjecture to chaos and hash function
Published 2023“…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
-
10
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
-
11
Tracking analysis of normalized adaptive algorithms
Published 2003“…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
Get full text
Get full text
article -
12
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…The two versions of the optimization problem are nonlinearly constrained where the objective function is the material weight of the supporting truss. …”
Get full text
article -
13
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. The protein structure prediction problem has real-world significance where several diseases are associated with the wrong folding of proteins. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
-
15
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
-
16
An improved kernelization algorithm for r-Set Packing
Published 2010“…We present a reduction procedure that takes an arbitrary instance of the r -Set Packing problem and produces an equivalent instance whose number of elements is in O(kr−1), where k is the input parameter. Such parameterized reductions are known as kernelization algorithms, and a reduced instance is called a problem kernel. …”
Get full text
Get full text
Get full text
article -
17
Scatter Search algorithm for Protein Structure Prediction
Published 2016“…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
Get full text
Get full text
Get full text
article -
18
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
19
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
20
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
Get full text
Get full text
article