بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
spatial modeling » statistical modeling (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
spatial modeling » statistical modeling (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
منشور في 2021"…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …"
-
2
-
3
-
4
CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments
منشور في 2024"…<p dir="ltr">In our research, we address the problem of coordination and planning in heterogeneous multi-robot systems for missions that consist of spatially localized tasks. Conventionally, this problem has been framed as a task allocation problem that maps tasks to robots. …"
-
5
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
منشور في 2022"…Therefore, in this study we examined this market based on the price index of the automotive group, then optimized a portfolio of automotive companies using two methods. In the first method, the CVaR measurement was modeled by means of DEA, then Particle Swarm Optimization (PSO) and the Imperial Competitive Algorithm (ICA) were used to solve the proposed model. …"
-
6
-
7
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…"
-
8
Valuation of commodity option prices under a regime-switching model with stochastic convenience yield: Model calibration using flower pollination optimization algorithm
منشور في 2025"…Using the WTI crude oil spot prices, the parameters involved in the proposed commodity regime-switching model are estimated by expectation–maximization algorithm. …"
-
9
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
منشور في 2025"…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …"
-
10
-
11
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
13
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
منشور في 2017"…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …"
احصل على النص الكامل
article -
14
-
15
-
16
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…This thesis will also apply the algorithms in order to determine how applicable it is to predict crypto currency exchange market prices. …"
احصل على النص الكامل
-
17
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Optimization algorithms are one of the most popular methods for solving NP-hard problems. …"
احصل على النص الكامل
-
18
-
19
-
20
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
احصل على النص الكامل
احصل على النص الكامل