Search alternatives:
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
its function » cost function (Expand Search)
a function » _ functional (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
its function » cost function (Expand Search)
a function » _ functional (Expand Search)
-
1
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
2
-
3
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
-
5
A fuzzy basis function network for generator excitation control
Published 1997“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
Get full text
Get full text
article -
6
Computational evluation of protein energy functions
Published 2014“…Proteins are organic compounds made up of chains of amino acids that fold into complex 3-dimensional structures based on their chemical and physical properties. A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
conferenceObject -
7
From Collatz Conjecture to chaos and hash function
Published 2023“…The results obtained from the comparative analysis highlight the superiority of the proposed hash function over existing alternatives, validating its potential as a robust solution for various cryptographic applications.…”
-
8
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
9
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
-
11
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
12
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…Therefore, β-hill climbing optimizer, a recent local search algorithm, is hybridized as a new operator in SCA to empower its exploitation capability to tackle ELD. …”
Get full text
-
13
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
14
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
15
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
16
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …”
-
17
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text
-
18
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
19
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …”
-
20
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”