بدائل البحث:
colony » colon (توسيع البحث)
يعرض 1 - 20 نتائج من 388 نتيجة بحث عن '(( differences colony algorithm ) OR ( differences based algorithms ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…One of the well-known designs of RDH is the difference expansion (DE) method. In the DE-based RDH method, finding spaces that create less distortion in the marked image is a significant challenge, and has a high insertion capacity. …"
    احصل على النص الكامل
  2. 2

    A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation حسب Iman M. Hosseini Naveh (16891482)

    منشور في 2021
    "…The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …"
  3. 3
  4. 4
  5. 5

    A matrix-based damage assessment and recovery algorithm حسب Haraty, Ramzi A.

    منشور في 2014
    "…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6
  7. 7
  8. 8

    Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications حسب Daoud, Mohammad Sh.

    منشور في 2023
    "…This paper introduces a comprehensive survey of a new population-based algorithm so-called gradient-based optimizer (GBO) and analyzes its major features. …"
    احصل على النص الكامل
  9. 9

    The buffered work-pool approach for search-tree based optimization algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Different algorithms adopt different branching and pruning techniques in order to reduce the unavoidable exponential growth in run time. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    Design of PSS and STATCOM-based damping stabilizers using genetic algorithms حسب Abido, M.A.

    منشور في 2006
    "…This study presents a singular value decomposition (SVD) based approach to assess and measure the controllability of the poorly damped electromechanical modes by different control inputs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Multi-marker-LD based genetic algorithm for tag SNP selection حسب Mansour, Nashat

    منشور في 2014
    "…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm حسب De Rochechouart, Maxence

    منشور في 2023
    "…The goal is to achieve efficient resource allocation based on different preset cost functions that take into account several local and global attributes. …"
    احصل على النص الكامل
  13. 13

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms حسب Abdel-Magid, Y. L.

    منشور في 2004
    "…This study also presents a singular value decomposition (SVD)-based approach to assess and measure the controllability of the poorly damped electromechanical modes by different control inputs. …"
    احصل على النص الكامل
    article
  14. 14

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm حسب Abido, M.A.

    منشور في 1999
    "…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques حسب Khalid, Naji

    منشور في 2023
    "…This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 17

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms حسب Arafat Rahman (8065562)

    منشور في 2021
    "…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …"
  18. 18

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering حسب Abu Zitar, Raed

    منشور في 2022
    "…We also evaluated the proposed AAOA with extensive comparisons to different optimization algorithms. The outcomes verified the superiority of the AAOA over the traditional AOA and several MH optimization algorithms. …"
  19. 19
  20. 20

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…"