Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
spatial modeling » statistical modeling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
spatial modeling » statistical modeling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
1
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
Published 2021“…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
-
2
-
3
-
4
CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments
Published 2024“…<p dir="ltr">In our research, we address the problem of coordination and planning in heterogeneous multi-robot systems for missions that consist of spatially localized tasks. Conventionally, this problem has been framed as a task allocation problem that maps tasks to robots. …”
-
5
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…Therefore, in this study we examined this market based on the price index of the automotive group, then optimized a portfolio of automotive companies using two methods. In the first method, the CVaR measurement was modeled by means of DEA, then Particle Swarm Optimization (PSO) and the Imperial Competitive Algorithm (ICA) were used to solve the proposed model. …”
-
6
-
7
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
-
8
Valuation of commodity option prices under a regime-switching model with stochastic convenience yield: Model calibration using flower pollination optimization algorithm
Published 2025“…Using the WTI crude oil spot prices, the parameters involved in the proposed commodity regime-switching model are estimated by expectation–maximization algorithm. …”
-
9
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …”
-
10
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …”
Get full text
article -
12
-
13
-
14
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…This thesis will also apply the algorithms in order to determine how applicable it is to predict crypto currency exchange market prices. …”
Get full text
-
15
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Optimization algorithms are one of the most popular methods for solving NP-hard problems. …”
Get full text
-
16
-
17
-
18
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
19
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. …”
Get full text
-
20
Holistic Design: Optimizing Mechatronic Systems Using Multi Objective Optimization
Published 2015Get full text
doctoralThesis