بدائل البحث:
using function » using fusion (توسيع البحث)
algorithm goa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث)
goa function » cost function (توسيع البحث)
algorithm fa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث), algorithms _ (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm goa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث)
goa function » cost function (توسيع البحث)
algorithm fa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث), algorithms _ (توسيع البحث)
-
61
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
62
A new reactive power optimization algorithm
منشور في 2003"…This paper presents an algorithm for optimizing reactive power using particle swarm algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
63
-
64
Metaheuristic Algorithm for State-Based Software Testing
منشور في 2018"…We formulate the testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
65
Radial basis function networks for contingency analysis of bulkpower systems
منشور في 1999"…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …"
احصل على النص الكامل
احصل على النص الكامل
article -
66
-
67
A new genetic algorithm approach for unit commitment
منشور في 1997"…The problem under consideration includes two linked subproblems: a combinatorial optimization problem and a nonlinear programming problem. The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …"
احصل على النص الكامل
احصل على النص الكامل
article -
68
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
69
-
70
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
71
Simultaneous stabilization of multimachine power systems viagenetic algorithms
منشور في 1999"…This paper demonstrates the use of genetic algorithms for the simultaneous stabilization of multimachine power systems over a wide range of operating conditions via single-setting power system stabilizers. …"
احصل على النص الكامل
احصل على النص الكامل
article -
72
Distributed dimension reduction algorithms for widely dispersed data
منشور في 2002احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
73
Evolutionary algorithms for VLSI multi-objective netlist partitioning
منشور في 2006"…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …"
احصل على النص الكامل
article -
74
An Evolutionary Algorithm for the Allocation Problem in High-Level Synthesis
منشور في 2005"…The system handles multicycle functional units as well as structural pipelining. The proposed method was implemented using C++ on a Linux workstation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
75
A neural networks algorithm for data path synthesis
منشور في 2003"…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
76
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
77
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
78
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
منشور في 2020"…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …"
احصل على النص الكامل
article -
79
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …"
احصل على النص الكامل
article -
80
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …"