بدائل البحث:
algorithm cost » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
algorithm its » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm a (توسيع البحث)
algorithm cost » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
algorithm its » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm a (توسيع البحث)
-
1
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: "…RD algorithm…"
احصل على النص الكامل
احصل على النص الكامل
-
2
-
3
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024الموضوعات: -
4
-
5
-
6
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022الموضوعات: "…Functional electrical stimulation…"
-
7
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
منشور في 2024"…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …"
احصل على النص الكامل
-
8
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
منشور في 2022"…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). …"
-
10
-
11
-
12
-
13
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
14
Economic load dispatch using memetic sine cosine algorithm
منشور في 2022"…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. ELD is tackled by assigning a set of generation units with a minimum fuel costs to generate predefined load demand with accordance to a set of equality and inequality constraints. …"
احصل على النص الكامل
-
15
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
16
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
منشور في 2023"…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. The optimization is applied to a formulated cost function that considers uncertainty, false alarms, and existing clutters. …"
احصل على النص الكامل
-
17
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017الموضوعات: احصل على النص الكامل
doctoralThesis -
18
Computational evluation of protein energy functions
منشور في 2014"…A protein is characterized by its 3D structure, which defines its biological function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
19
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
20
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"