Search alternatives:
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
1 function » _ functional (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
1 function » _ functional (Expand Search)
-
121
Minimizing using BBO and DFO methods
Published 2022“…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …”
Get full text
Get full text
Get full text
masterThesis -
122
Boosting the visibility of services in microservice architecture
Published 2023“…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
-
123
-
124
-
125
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…Especially, we apply domain functionals to study the capacities of condensers (G,E) where G is a simply connected domain in the complex plane and E is a compact subset of G. …”
Get full text
Get full text
Get full text
article -
126
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
127
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
128
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
129
Distributed dimension reduction algorithms for widely dispersed data
Published 2002“…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…”
Get full text
Get full text
Get full text
conferenceObject -
130
-
131
A hybrid of clustering and meta-heuristic algorithms to solve a p-mobile hub location–allocation problem with the depreciation cost of hub facilities
Published 2021“…To solve the proposed model, four meta-heuristic algorithms, namely multi-objective particle swarm optimization (MOPSO), a non-dominated sorting genetic algorithm (NSGA-II), a hybrid of k-medoids as a famous clustering algorithm and NSGA-II (KNSGA-II), and a hybrid of K-medoids and MOPSO (KMOPSO) are implemented. …”
-
132
An Evolutionary Algorithm for the Allocation Problem in High-Level Synthesis
Published 2005“…The system handles multicycle functional units as well as structural pipelining. The proposed method was implemented using C++ on a Linux workstation. …”
Get full text
Get full text
Get full text
article -
133
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …”
-
134
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
Published 2020“…Each cluster in the swarm has its own cluster best position which is the best position within a cluster and the global best position is located by clusters communication. …”
-
135
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
Get full text
Get full text
Get full text
article -
136
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
-
137
An incremental approach for test scheduling and synthesis using genetic algorithms
Published 2017“…The method is based on a genetic algorithm that efficiently explores the testable design space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
138
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
Published 2007“…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
Get full text
Get full text
Get full text
article -
139
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
Published 2022“…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). …”
-
140
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
Get full text
Get full text
Get full text
conferenceObject