بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
element » elements (توسيع البحث)
-
201
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
منشور في 2021"…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …"
-
202
Fuzzified ant colony optimization algorithm for efficient combinational circuits synthesis
منشور في 2004"…Multiobjective optimization of logic circuits based on a fuzzified ant colony (ACO) algorithm is presented. The results obtained using the proposed algorithm are compared to those obtained using SIS in terms of area, delay and power for some known circuits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
203
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
204
A parallel optimization algorithm for the maximum clique problem. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
205
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
منشور في 2018"…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
206
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The LR model showed the foremost predictions of ground loss as compared to all the other models analyzed. …"
-
207
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …"
احصل على النص الكامل
article -
208
The buffered work-pool approach for search-tree based optimization algorithms
منشور في 2017"…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
209
A novel design technique for generating building form
منشور في 2018"…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…"
احصل على النص الكامل
-
210
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
211
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل
-
212
A new tabu search algorithm for the long-term hydro scheduling problem
منشور في 2002"…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …"
احصل على النص الكامل
احصل على النص الكامل
article -
213
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …"
-
214
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
منشور في 2022"…Various sensors and equipment are installed in the AAL context to collect a wide variety of data. Furthermore, AAL could be the motivating technique for the most recent care models by working as an adjunct. …"
احصل على النص الكامل
-
215
Digital circuit design through simulated evolution (SimE)
منشور في 2003"…In this paper, the use of simulated evolution (SimE) algorithm in the design of digital logic circuits is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
216
A quantum algorithm for evolving open quantum dynamics on quantum computing devices
منشور في 2020"…<p dir="ltr">Designing quantum algorithms for simulating quantum systems has seen enormous progress, yet few studies have been done to develop quantum algorithms for open quantum dynamics despite its importance in modeling the system-environment interaction found in most realistic physical models. …"
-
217
Design of a TE-pass reflection mode optical polarizer
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
article -
218
Design of a vibration absorber for harmonically forced damped systems
منشور في 2013"…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
219
Power system output feedback stabilizer design via geneticalgorithms
منشور في 1997"…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …"
احصل على النص الكامل
احصل على النص الكامل
article -
220
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
منشور في 2021"…An attacker can easily capture data from the available network channel and use it for their own purpose. …"