يعرض 81 - 100 نتائج من 295 نتيجة بحث عن '(( algorithm using function ) OR ( algorithm sma function ))*', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 81

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 82

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 83
  4. 84

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  5. 85
  6. 86

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem حسب Abu Zitar, Raed

    منشور في 2023
    "…The measurements and track generation are simulated using Stone Soup software. On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …"
    احصل على النص الكامل
  7. 87
  8. 88

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities حسب Moinuddin, M.

    منشور في 2003
    "…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 89

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study حسب Youssef, H.

    منشور في 2020
    "…This is a hard multi-criteria optimization problem. Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …"
    احصل على النص الكامل
    article
  10. 90

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) حسب Lamaa, Karine H.

    منشور في 2018
    "…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 91

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem حسب Mantawy, A.H.

    منشور في 1999
    "…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 92

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems حسب Wali Khan Mashwani (14590504)

    منشور في 2021
    "…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …"
  13. 93
  14. 94

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
  15. 95

    A parallel tabu search algorithm for VLSI standard-cell placement حسب Suit, S.M.

    منشور في 2000
    "…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 96

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…In addition, these new algorithms, compared against basic versions of other metaheuristics using classical benchmark problems, show competitive performances. …"
  17. 97

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 98

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
  19. 99

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems حسب Abu Zitar, Raed

    منشور في 2022
    "…The latter case is confirmed through 23 benchmark functions with different features using statistical and nonparametric tests. …"
    احصل على النص الكامل
  20. 100

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…SASA is found to be able to suppress the unwanted wave packets from the overall signal leaving behind only the incident wave for a healthy spec imen, and the incident wave and its reflection from the defect for a damaged specimen. The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …"
    احصل على النص الكامل