Search alternatives:
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
-
1
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
-
2
-
3
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
4
-
5
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
6
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
7
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
8
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
Get full text
Get full text
Get full text
conferenceObject -
9
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The three heuristics are applied on the same optimization problem and compared with respect to (1) quality of the best solution identified by each heuristic, (2) progress of the search frominitial solution(s) until stopping criteria are met, (3) the progress of the cost of the best solution as a function of time (iteration count), and (4) the number of solutions found at successive intervals of the cost function. …”
Get full text
article -
10
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
-
11
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …”
Get full text
-
12
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…FS is an important data reduction step in data mining which finds the most representative features from the entire data. Many FS-based swarm intelligence algorithms have been used to tackle FS. …”
-
13
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
14
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …”
-
15
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
16
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
17
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
Published 2020“…Due to imprecise nature of objective values, fuzzy logic is incorporated in the design of aggregating function. The above technique is applied to the placement of ISCAS-89 benchmark circuits and the results are compared with those obtained from individual application of GA and TS on this problem.…”
Get full text
article -
18
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…<p dir="ltr">Load balancing is a serious problem in cloud computing that makes it challenging to ensure the proper functioning of services contiguous to the Quality of Service, performance assessment, and compliance to the service contract as demanded from cloud service providers (CSP) to organizations. …”
-
19
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
Get full text
Get full text
Get full text
Get full text
article -
20