Search alternatives:
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
-
121
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
122
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …”
Get full text
article -
123
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
Published 2020“…Numerical results are provided to illustrate both the use of the algorithm in the study of the optimal cost function and the latter's sensitivity to different changes in cost factors. …”
Get full text
article -
124
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
125
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
Get full text
Get full text
Get full text
article -
126
A comparative study of RSA based digital signature algorithms
Published 2006“…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
127
Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants
Published 2022“…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”
-
128
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
129
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
130
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
131
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
Published 2012Get full text
Get full text
masterThesis -
132
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
Get full text
Get full text
article -
133
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
Get full text
Get full text
Get full text
masterThesis -
134
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”
-
135
A parallel tabu search algorithm for VLSI standard-cell placement
Published 2000“…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
Get full text
Get full text
article -
136
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…In addition, these new algorithms, compared against basic versions of other metaheuristics using classical benchmark problems, show competitive performances. …”
-
137
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
138
Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques
Published 2025“…In the first stage, the WPT is used to split the PV voltage and string currents into specific sub-band frequencies, and then EMD is used to decompose the selected frequency bands into a number of intrinsic mode functions (IMFs) and a residual. …”
-
139
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
140
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…SASA is found to be able to suppress the unwanted wave packets from the overall signal leaving behind only the incident wave for a healthy spec imen, and the incident wave and its reflection from the defect for a damaged specimen. The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
Get full text