Search alternatives:
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
-
41
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023“…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
Get full text
-
42
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
Published 2020“…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
-
43
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
44
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
45
-
46
-
47
-
48
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
49
-
50
Machine Learning Model for a Sustainable Drilling Process
Published 2023Get full text
doctoralThesis -
51
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
52
-
53
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
Get full text
-
54
Evaluation of transfer functions for punctured turbo codes
Published 2000“…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
Get full text
Get full text
article -
55
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
56
A new multimodulus blind equalization algorithm
Published 2004“…A new algorithm is presented for the blind equalization of complex signals. …”
Get full text
Get full text
article -
57
A new reactive power optimization algorithm
Published 2003“…A new implementation for the particle swarm algorithm has been applied. …”
Get full text
Get full text
article -
58
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
59
A Stochastic Newton-Raphson Method with Noisy Function Measurements
Published 2016“…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
60
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis