Search alternatives:
where function » heart function (Expand Search)
achieves » achieved (Expand Search), achieve (Expand Search), archives (Expand Search)
where function » heart function (Expand Search)
achieves » achieved (Expand Search), achieve (Expand Search), archives (Expand Search)
-
1
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023“…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
Get full text
-
2
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
3
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
4
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
5
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. In most cases, the results show that solutions achieved by the IDMO are better than those obtained by the existing algorithms.…”
Get full text
-
6
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
7
Iterative Least Squares Functional Networks Classifier
Published 2007“…The study was achieved with only sets of second-order linearly independent polynomial functions to approximate the neuron functions. …”
Get full text
Get full text
article -
8
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…The two versions of the optimization problem are nonlinearly constrained where the objective function is the material weight of the supporting truss. …”
Get full text
article -
9
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
-
10
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. The protein structure prediction problem has real-world significance where several diseases are associated with the wrong folding of proteins. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
-
12
An improved kernelization algorithm for r-Set Packing
Published 2010“…We present a reduction procedure that takes an arbitrary instance of the r -Set Packing problem and produces an equivalent instance whose number of elements is in O(kr−1), where k is the input parameter. Such parameterized reductions are known as kernelization algorithms, and a reduced instance is called a problem kernel. …”
Get full text
Get full text
Get full text
article -
13
A Stochastic Newton-Raphson Method with Noisy Function Measurements
Published 2016“…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
14
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
15
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
16
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
17
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
18
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…Abstract Evolutionary algorithms, simulated annealing (SA), and tabu search (TS) are general iterative algorithms for combinatorial optimization. …”
Get full text
article -
19
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
20
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”