Showing 1 - 20 results of 71 for search '(( algorithm ai function ) OR ( algorithm ((aoa function) OR (most function)) ))', query time: 0.14s Refine Results
  1. 1

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. A novel MH optimization algorithm, called arithmetic optimization algorithm (AOA), was proposed to address complex optimization tasks. …”
  2. 2
  3. 3

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …”
  4. 4

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-Ani (17541447)

    Published 2023
    “…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
  5. 5

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  6. 6

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
    Get full text
    Get full text
  7. 7

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
  8. 8

    Iterative Least Squares Functional Networks Classifier by Faisal, Kanaan A

    Published 2007
    “…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …”
    Get full text
    Get full text
    article
  9. 9

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 10

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  11. 11
  12. 12

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
    Get full text
    Get full text
    article
  13. 13

    Belief selection in point-based planning algorithms for POMDPs by Azar, Danielle

    Published 2017
    “…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 14

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15
  16. 16

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers by Mansour, Nashat

    Published 1997
    “…We experimentally analyze some properties of simulated annealing algorithms (SA) and genetic algorithms (GA) for mapping data to multicomputers. …”
    Get full text
    Get full text
    Get full text
    article
  17. 17

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images by Abu Zitar, Raed

    Published 2023
    “…The leading mathematical arithmetic operators' distributional nature is used by the AOA method. The picture histogram was used to construct the candidate solutions in the modified algorithms, which were then updated according to the algorithm's features. …”
    Get full text
  18. 18
  19. 19

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. Most widely known algorithms of this category are genetic algorithms (GA). …”
    Get full text
    article
  20. 20

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”