Search alternatives:
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
based function » taste function (Expand Search)
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
based function » taste function (Expand Search)
-
1
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …”
-
2
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
3
-
4
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
5
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: Get full text
Get full text
-
6
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
Get full text
Get full text
Get full text
Get full text
article -
7
-
8
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…The local search operator employs a single insertion approach, while the acceptance–rejection criteria are based on a constant temperature. Parameters of both ES and IG algorithms are calibrated using the Multifactor analysis of variance technique. …”
-
9
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
11
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
-
12
-
13
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
Get full text
article -
14
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
15
Computational evluation of protein energy functions
Published 2014“…A protein is characterized by its 3D structure, which defines its biological function. Proteins fold into 3D structures in a way that leads to low-energy state. …”
Get full text
Get full text
Get full text
conferenceObject -
16
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…The proposed algorithm, which is mainly based on genetic algorithms incorporates tabu search method to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
article -
17
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
18
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
19
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
20
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”