Search alternatives:
algorithm steps » algorithm its (Expand Search)
algorithm ai » algorithm a (Expand Search), algorithm aoa (Expand Search), algorithm _ (Expand Search)
algorithm steps » algorithm its (Expand Search)
algorithm ai » algorithm a (Expand Search), algorithm aoa (Expand Search), algorithm _ (Expand Search)
-
1
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
2
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
-
3
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text
-
4
Learning continuous functions using decision tree learning algorithms
Published 2001Get full text
masterThesis -
5
Tracking analysis of normalized adaptive algorithms
Published 2003“…The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
Get full text
Get full text
article -
6
-
7
New enumeration algorithm for regular boolean functions
Published 2018“…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
-
9
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
10
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
11
-
12
-
13
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
14
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
Get full text
Get full text
article -
15
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…Since we use Multi-objects to track, the Joint Probability Distribution Function (JPDA) estimates the best measurement values with a preset gating threshold. …”
Get full text
-
16
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
17
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
18
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
19
A new tabu search algorithm for the long-term hydro scheduling problem
Published 2002“…The proposed implementation contributes to the enhancement of speed and convergence of the original tabu search algorithm (TSA). A significant reduction in the objective function over previous classical optimization methods and a simulated annealing algorithm has been achieved. …”
Get full text
Get full text
article -
20
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”