Search alternatives:
would algorithm » mould algorithm (Expand Search)
Showing 1 - 20 results of 398 for search '(( differences would algorithm ) OR ( differences based algorithms ))', query time: 0.09s Refine Results
  1. 1
  2. 2

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…One of the well-known designs of RDH is the difference expansion (DE) method. In the DE-based RDH method, finding spaces that create less distortion in the marked image is a significant challenge, and has a high insertion capacity. …”
    Get full text
  3. 3

    Multi-marker-LD based genetic algorithm for tag SNP selection by Mansour, Nashat

    Published 2014
    “…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4

    A matrix-based damage assessment and recovery algorithm by Haraty, Ramzi A.

    Published 2014
    “…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5
  6. 6
  7. 7

    Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…This paper introduces a comprehensive survey of a new population-based algorithm so-called gradient-based optimizer (GBO) and analyzes its major features. …”
    Get full text
  8. 8

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The goal is to find a sensor or minimum set of sensors that would be enough to generate high-quality tracking based on optimum resource allocation. …”
    Get full text
  9. 9

    The buffered work-pool approach for search-tree based optimization algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…Different algorithms adopt different branching and pruning techniques in order to reduce the unavoidable exponential growth in run time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    Design of PSS and STATCOM-based damping stabilizers using genetic algorithms by Abido, M.A.

    Published 2006
    “…This study presents a singular value decomposition (SVD) based approach to assess and measure the controllability of the poorly damped electromechanical modes by different control inputs. …”
    Get full text
    Get full text
    article
  11. 11

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
    Get full text
    Get full text
    Get full text
    article
  12. 12

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm by De Rochechouart, Maxence

    Published 2023
    “…The goal is to achieve efficient resource allocation based on different preset cost functions that take into account several local and global attributes. …”
    Get full text
  13. 13
  14. 14

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms by Abdel-Magid, Y. L.

    Published 2004
    “…This study also presents a singular value decomposition (SVD)-based approach to assess and measure the controllability of the poorly damped electromechanical modes by different control inputs. …”
    Get full text
    article
  15. 15

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm by Abido, M.A.

    Published 1999
    “…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
    Get full text
    Get full text
    article
  16. 16

    AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques by Khalid, Naji

    Published 2023
    “…This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Get full text
    article
  17. 17

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms by Arafat Rahman (8065562)

    Published 2021
    “…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …”
  18. 18

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…We also evaluated the proposed AAOA with extensive comparisons to different optimization algorithms. The outcomes verified the superiority of the AAOA over the traditional AOA and several MH optimization algorithms. …”
  19. 19

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology by Jaber, Mohammad

    Published 2020
    “…The proposed algorithm is compared with different previous works and experimental results are recorded.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 20

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”