Search alternatives:
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
-
321
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…The performance of the HES-IG algorithm is calibrated with other algorithms using the Wilcoxon signed test. …”
-
322
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
323
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
324
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
325
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
article -
326
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
article -
327
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
328
Leveraging Machine and Deep Learning Algorithms for hERG Blocker Prediction
Published 2025“…This adjustment highlights the importance of concentration levels in reflecting the variability specific to individual interaction sites. The algorithm results show that the internal validation performance of RF, XGBoost, and MLP is strong, with AUC scores of 0.90, 0.90, and 0.87, respectively. …”
-
329
A parallel genetic algorithm for the geometrically constrained site layout problem
Published 2018“…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
Get full text
Get full text
Get full text
conferenceObject -
330
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
331
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
332
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The picture histogram is used to display the algorithm's potential solutions. …”
Get full text
-
333
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
-
334
A comparative study of ElGamal based digital signature algorithms
Published 2006“…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
335
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…A simulated annealing method is used to accelerate the convergence of the genetic algorithm by applying the simulated annealing test for all the population members. …”
Get full text
Get full text
article -
336
A new simulated annealing-based tabu search algorithm for unitcommitment
Published 1997“…The algorithm integrates the use of simulated annealing (SA) and tabu search (TS) for solving the UCP. …”
Get full text
Get full text
article -
337
Modified clarke wright algorithms for solving the realistic vehicle routing problem
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject -
338
-
339
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
Published 2022“…The latter case is confirmed through 23 benchmark functions with different features using statistical and nonparametric tests. The superiority of the proposed Lévy flight-based reptile search and Nelder-Mead (L-RSANM) algorithm-based PID controller for the AVR system is demonstrated comparatively using convergence, statistical and nonparametric tests along with transient and frequency responses. …”
Get full text
-
340