Showing 81 - 100 results of 295 for search '(( ((algorithm dealing) OR (algorithm using)) functional ) OR ( algorithm python function ))*', query time: 0.11s Refine Results
  1. 81

    Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning by Sait, Sadiq M.

    Published 2003
    “…A series of experiments are performed to evaluate the efficiency of the algorithm. ISCAS-85/89 benchmark circuits are used and experimental results are reported and compared to earlier algorithms like GA and TS.…”
    Get full text
    Get full text
    article
  2. 82

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
    Get full text
    Get full text
    article
  3. 83

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers by Mansour, Nashat

    Published 1997
    “…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
    Get full text
    Get full text
    Get full text
    article
  4. 84
  5. 85

    A parallel tabu search algorithm for VLSI standard-cell placement by Suit, S.M.

    Published 2000
    “…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
    Get full text
    Get full text
    article
  6. 86

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  7. 87
  8. 88

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…The measurements and track generation are simulated using Stone Soup software. On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …”
    Get full text
  9. 89

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities by Moinuddin, M.

    Published 2003
    “…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
    Get full text
    Get full text
    article
  10. 90
  11. 91

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 92

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images by Abu Zitar, Raed

    Published 2023
    “…The picture histogram is used to display the algorithm's potential solutions. …”
    Get full text
  13. 93

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms by Zhongqiang Ma (13765801)

    Published 2023
    “…In addition, these new algorithms, compared against basic versions of other metaheuristics using classical benchmark problems, show competitive performances. …”
  14. 94

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…This is a hard multi-criteria optimization problem. Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …”
    Get full text
    article
  15. 95

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”
  16. 96

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 97

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem by Mantawy, A.H.

    Published 1999
    “…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
    Get full text
    Get full text
    article
  18. 98

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
  19. 99

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems by Abu Zitar, Raed

    Published 2022
    “…The Lévy flight concept is used for better exploration capability in the proposed algorithm, whereas the Nelder-Mead simplex search algorithm is integrated for further exploitation. …”
    Get full text
  20. 100

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…SASA is found to be able to suppress the unwanted wave packets from the overall signal leaving behind only the incident wave for a healthy spec imen, and the incident wave and its reflection from the defect for a damaged specimen. The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
    Get full text