Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
-
1
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
2
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
3
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
4
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
-
5
-
6
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
Get full text
-
7
Adaptive bias simulated evolution algorithm for placement
Published 2001“…This parameter has major impact on the algorithm run-time and the quality of the solution subspace searched. …”
Get full text
Get full text
article -
8
-
9
-
10
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
Get full text
article -
11
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article -
12
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
13
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
Published 2021“…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …”
Get full text
-
14
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
15
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
-
16
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
17
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
18
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
19
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
20