Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
spatial modeling » statistical modeling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
element » elements (Expand Search)
Showing 1 - 20 results of 374 for search '(( element maya algorithm ) OR ((( spatial modeling algorithm ) OR ( applied using algorithm ))))', query time: 0.19s Refine Results
  1. 1

    Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams by Eduardo Feo-Flushing (23276023)

    Published 2021
    “…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
  2. 2
  3. 3
  4. 4

    CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments by Ishaq Ansari (22047902)

    Published 2024
    “…<p dir="ltr">In our research, we address the problem of coordination and planning in heterogeneous multi-robot systems for missions that consist of spatially localized tasks. Conventionally, this problem has been framed as a task allocation problem that maps tasks to robots. …”
  5. 5

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…Therefore, in this study we examined this market based on the price index of the automotive group, then optimized a portfolio of automotive companies using two methods. In the first method, the CVaR measurement was modeled by means of DEA, then Particle Swarm Optimization (PSO) and the Imperial Competitive Algorithm (ICA) were used to solve the proposed model. …”
  6. 6
  7. 7

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
  8. 8

    Valuation of commodity option prices under a regime-switching model with stochastic convenience yield: Model calibration using flower pollination optimization algorithm by A. Hamdi (17906918)

    Published 2025
    “…Using the WTI crude oil spot prices, the parameters involved in the proposed commodity regime-switching model are estimated by expectation–maximization algorithm. …”
  9. 9

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …”
  10. 10

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) by AlHamaydeh, Mohammad

    Published 2017
    “…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …”
    Get full text
    article
  12. 12
  13. 13
  14. 14

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence by Al Rayhi, Nasser

    Published 2020
    “…This thesis will also apply the algorithms in order to determine how applicable it is to predict crypto currency exchange market prices. …”
    Get full text
  15. 15
  16. 16
  17. 17
  18. 18

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  19. 19

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. …”
    Get full text
  20. 20