Showing 41 - 60 results of 349 for search '(( ((algorithm a) OR (algorithm its)) function ) OR ( algorithm machine function ))', query time: 0.14s Refine Results
  1. 41

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm by De Rochechouart, Maxence

    Published 2023
    “…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
    Get full text
  2. 42

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  3. 43

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  9. 49
  10. 50
  11. 51

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 52
  13. 53

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
    Get full text
  14. 54

    Evaluation of transfer functions for punctured turbo codes by Mugaibel, A.H.

    Published 2000
    “…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
    Get full text
    Get full text
    article
  15. 55

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  16. 56

    A new multimodulus blind equalization algorithm by Abrar, Shafayat

    Published 2004
    “…A new algorithm is presented for the blind equalization of complex signals. …”
    Get full text
    Get full text
    article
  17. 57

    A new reactive power optimization algorithm by Mantawy, A.H.

    Published 2003
    “…A new implementation for the particle swarm algorithm has been applied. …”
    Get full text
    Get full text
    article
  18. 58

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  19. 59

    A Stochastic Newton-Raphson Method with Noisy Function Measurements by Saab, Khaled Kamal

    Published 2016
    “…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 60