Search alternatives:
most function » cost function (Expand Search), taste function (Expand Search)
algorithm ai » algorithm a (Expand Search), algorithm aoa (Expand Search), algorithm _ (Expand Search)
aoa function » cost function (Expand Search)
ai function » daily function (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
algorithm ai » algorithm a (Expand Search), algorithm aoa (Expand Search), algorithm _ (Expand Search)
aoa function » cost function (Expand Search)
ai function » daily function (Expand Search)
-
1
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. A novel MH optimization algorithm, called arithmetic optimization algorithm (AOA), was proposed to address complex optimization tasks. …”
-
2
-
3
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …”
-
4
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
-
5
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
6
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text
-
7
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
8
Iterative Least Squares Functional Networks Classifier
Published 2007“…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …”
Get full text
Get full text
article -
9
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
10
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
11
-
12
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
13
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
16
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …”
Get full text
Get full text
Get full text
article -
17
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The leading mathematical arithmetic operators' distributional nature is used by the AOA method. The picture histogram was used to construct the candidate solutions in the modified algorithms, which were then updated according to the algorithm's features. …”
Get full text
-
18
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
19
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. Most widely known algorithms of this category are genetic algorithms (GA). …”
Get full text
article -
20
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”