Search alternatives:
using function » using fusion (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
using function » using fusion (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
-
61
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
62
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
-
63
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text
-
64
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
65
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …”
Get full text
Get full text
article -
66
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
Published 2004“…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
Get full text
article -
67
-
68
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
69
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
70
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…SSL uses three interdependent cryptographic functions to perform a secure connection. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
71
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
72
Tracking analysis of normalized adaptive algorithms
Published 2003“…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
Get full text
Get full text
article -
73
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…A series of experiments are performed to evaluate the efficiency of the algorithms. …”
Get full text
article -
74
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
-
76
-
77
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…This is a hard multi-criteria optimization problem. Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …”
Get full text
article -
78
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…In this paper, a multiswarm-intelligence-based algorithm (MSIA) is developed to cope with bound constrained functions. …”
-
79
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
80
A parallel tabu search algorithm for VLSI standard-cell placement
Published 2000“…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
Get full text
Get full text
article