Search alternatives:
"algorithm performs" » "algorithm perform" (Expand Search), "algorithm performed" (Expand Search)
"algorithm performs" » "algorithm perform" (Expand Search), "algorithm performed" (Expand Search)
-
1
Transform Domain LMS/F Algorithms, Performance Analysis and Applications
Published 2020Get full text
masterThesis -
2
-
3
EFFICIENT ALGORITHM FOR WEINBERGER ARRAY FOLDING
Published 2020“…THis paper describes an algorithm for folding weinberger arrays. The algorithm performs column and row ordering and tehn column folding. …”
Get full text
article -
4
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016“…Experimental results show that the algorithm performs well on the benchmarks. The algorithm was able to find an optimum solution in many cases.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
Bee colony algorithm for assigning proctors to exams. (c2013)
Published 2013Get full text
Get full text
masterThesis -
6
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. Our algorithm performs better than previous algorithms by finding lower energy structures or by performing fewer numbers of energy evaluations.…”
Get full text
Get full text
Get full text
article -
7
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. The algorithm performs a neighborhood search combined with a random search to balance exploration and exploitation. …”
Get full text
Get full text
Get full text
article -
8
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022“…The results show that the algorithm performs well while generating sub-optimal solutions.…”
Get full text
Get full text
Get full text
masterThesis -
9
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The results of this work prove that our algorithm performs better than the other algorithms in both the damage assessment and the recovery stages.…”
Get full text
Get full text
Get full text
Get full text
article -
10
-
11
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
Published 2021“…The obtained results proved that the proposed algorithm performs well while classifying textual and non-textual region with better accuracy than benchmark state-of-the-art algorithms.…”
-
12
Metaheuristic Optimization‐Based Sliding Mode Control With Modified Perturb and Observe for Controlling MPPT of a PV Interfaced Grid Connected System
Published 2025“…The suggested approach looks for every maximum point across a lengthy number of cycles to find the global maximum point after introducing (MGO‐MPb&O), and the results of the MATLAB/Simulink show that the algorithm performs well under the arbitrary changes of the physical parameters of the proposed system and ambient scenario. …”
-
13
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…The results show that the performance of the newly proposed EBCM algorithm performs similarly to the 4 compared algorithms and has the same properties and behaviors, such as convergence, diversity, exploration and exploitation trade-offs, in many aspects. …”
-
14
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…It is critical to assess this algorithm's performance in comparison with other well-known heuristic methods. …”
Get full text
Get full text
-
15
Whale optimization algorithm: analysis and full survey
Published 2024“…The survey further discusses the algorithm's performance on a wide range of optimization problems, showcasing its competitiveness and effectiveness. …”
Get full text
-
16
An optimal stochastic multivariable PID controller
Published 2019“…Simulation results are included to illustrate the performance capabilities of the proposed algorithm. Performance comparison with an optimal stochastic iterative learning control scheme, an optimal PID controller, an adaptive PID controller, and a recent optimal stochastic PID controller are also included.…”
Get full text
Get full text
Get full text
Get full text
article -
17
Using C++ to Calculate SO(10) Tensor Couplings
Published 2021“…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. This paper outlines the details of such software, implemented in C++ using in-built libraries. …”
Get full text
article -
18
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…It is also tested for the case when more information, beyond nearest neighbors, is made available; here, we test its operation for different numbers of step look-ahead. We verify algorithm performance by means of simulations, whereby navigational paths are calculated for different radiation fields.…”
Get full text
article -
19
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…Analysis of the algorithm performance showed promising results and indicated improvement of the recommendations over time.…”
Get full text
Get full text
-
20
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. Moreover we studied the vulnerability of such attacks on two of the most famous security devices used for access-restricted sites; which is known as “Biometric devices”. …”
Get full text