Search alternatives:
algorithm its » algorithm _ (Expand Search), algorithm goa (Expand Search), algorithm a (Expand Search)
algorithm _i » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithm a (Expand Search)
its function » cost function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
_i function » _ functional (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm goa (Expand Search), algorithm a (Expand Search)
algorithm _i » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithm a (Expand Search)
its function » cost function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
_i function » _ functional (Expand Search)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006Get full text
Get full text
article -
2
-
3
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
4
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…The results show that the performance of the SCA-βHC algorithm is increased by tuning its parameters in proper value. …”
Get full text
-
6
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
7
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
Published 2017“…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …”
-
8
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
9
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
10
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
-
11
Second-order conic programming for data envelopment analysis models
Published 2022“…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
12
Computational evluation of protein energy functions
Published 2014“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
conferenceObject -
13
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
15
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
16
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
17
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…Compared to those with wild type, carriers of reduced function alleles in <i>CYP2C9</i> required significantly lower median (IQR) warfarin weekly dose [24.5 (15.3) vs. 35 (29.8) mg/week, p=0.006]. …”
-
18
A fuzzy basis function network for generator excitation control
Published 1997“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
Get full text
Get full text
article -
19
Evolutionary algorithm for predicting all-atom protein structure
Published 2011Get full text
Get full text
Get full text
conferenceObject -
20
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject