Search alternatives:
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data hiding » data mining (Expand Search)
element » elements (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data hiding » data mining (Expand Search)
element » elements (Expand Search)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
2
-
3
-
4
A discrete-time learning control algorithm
Published 1994Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
-
6
-
7
-
8
Linear-time algorithms for problems on planar graphs with fixed disk dimension
Published 2007“…This reduction is used to obtain linear-time exact and approximation algorithms on graphs with fixed disk dimension. …”
Get full text
Get full text
Get full text
article -
9
Discrete-time learning control algorithm for a class of nonlinear systems
Published 1995Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
A multiobjective optimization method for the SOC Test Time, TAM, and power optimization using a strength pareto evolutionary algorithm
Published 2017“…This paper presents a multiobjective optimization approach for the SOC test scheduling problem. The method uses a Strength Pareto Evolutionary Algorithm that minimizes the overall test application time in addition to power, wrapper design and TAM assignment. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
Smart transportation solutions for faster emergency medical services response using an enhanced whale optimization algorithm
Published 2024“…The results obtained using different algorithms are compared with those obtained using mWOA. …”
-
12
A time-domain algorithm for the analysis of second-harmonicgeneration in nonlinear optical structures
Published 2000“…The simulation algorithm is based on nonlinear wave equations representing the propagating fields and is solved using the finite-difference time-domain method. …”
article -
13
A time-domain algorithm for the analysis of second-harmonicgeneration in nonlinear optical structures
Published 2000“…The simulation algorithm is based on nonlinear wave equations representing the propagating fields and is solved using the finite-difference time-domain method. …”
Get full text
Get full text
article -
14
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …”
-
15
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…This paper presents the decoding of the I-Q space-time (ST) codes. The decoding problem of I-Q ST codes is formulated. …”
Get full text
Get full text
article -
16
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. …”
Get full text
article -
17
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
18
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
Published 2020“…In this paper, for the first time, a real-time implementation of SHM using an off-the-shelf mid-range microcontroller is presented and tested. …”
-
19
-
20