Search alternatives:
algorithm aoa » algorithm goa (Expand Search), algorithm _ (Expand Search), algorithms a (Expand Search)
aoa function » cost function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
algorithm aoa » algorithm goa (Expand Search), algorithm _ (Expand Search), algorithms a (Expand Search)
aoa function » cost function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
a function » _ functional (Expand Search)
-
41
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
42
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
43
A parallel tabu search algorithm for VLSI standard-cell placement
Published 2000“…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
Get full text
Get full text
article -
44
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
45
Computational evluation of protein energy functions
Published 2014“…In this project, we carry out a computational evaluation of putative protein energy functions. …”
Get full text
Get full text
Get full text
conferenceObject -
46
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
47
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. RVFL model has several characteristics such as fast training speed, direct links, simple architecture, and universal approximation capability, that make it a viable randomized neural network. …”
-
48
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
Get full text
Get full text
article -
49
GAP - A GENETIC ALGORITHM APPROACH TO OPTIMIZE 2-BIT DECODER PLAS
Published 2020“…This paper describes a minimization procedure that uses a genetic algorithm approach to reduce the size to the two bit decoder PLAs. …”
Get full text
article -
50
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
Get full text
article -
51
A new tabu search algorithm for the long-term hydro scheduling problem
Published 2002“…The proposed implementation contributes to the enhancement of speed and convergence of the original tabu search algorithm (TSA). A significant reduction in the objective function over previous classical optimization methods and a simulated annealing algorithm has been achieved. …”
Get full text
Get full text
article -
52
-
53
-
54
-
55
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
56
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
57
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
58
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
Published 1999“…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
Get full text
Get full text
article -
59
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
Published 2020“…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
Get full text
article -
60
From Collatz Conjecture to chaos and hash function
Published 2023“…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”