Search alternatives:
column optimization » policy optimization (Expand Search), chimp optimization (Expand Search)
3 based » _ based (Expand Search), ni based (Expand Search), cu based (Expand Search)
basic » basis (Expand Search)
column optimization » policy optimization (Expand Search), chimp optimization (Expand Search)
3 based » _ based (Expand Search), ni based (Expand Search), cu based (Expand Search)
basic » basis (Expand Search)
-
1
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
Get full text
Get full text
Get full text
article -
2
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
3
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
Published 2024“…Each time frame (time slot) comprises three sub-frames: sensing, reporting, and either transmission or energy harvesting based on the presence or absence of the primary user. …”
-
4
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
5
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
Get full text
Get full text
Get full text
masterThesis -
6
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”