Search alternatives:
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
pooled using » problem using (Expand Search), tool using (Expand Search), tools using (Expand Search)
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
pooled using » problem using (Expand Search), tool using (Expand Search), tools using (Expand Search)
-
1
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…This new trend has been motivated by hardness of approximation results that appeared in the last decade, and has taken a great boost by the emergence of parameterized complexity theory. Exact algorithms often follow the classical search-tree based recursive backtracking strategy. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
2
Compressed sensing based image denoising: novel patch-based collaborative algorithms
Published 2020Get full text
masterThesis -
3
-
4
Teaching–learning-based optimization algorithm: analysis study and its application
Published 2024“…The teaching–learning-based optimization (TLBO) algorithm is a novel nature-based optimization approach that has attracted a lot of interest from researchers because of its great capacity to handle optimization problems. …”
Get full text
-
5
How can algorithms help in segmenting users and customers? A systematic review and research agenda for algorithmic customer segmentation
Published 2023“…We found researchers employing 46 different algorithms and 14 different evaluation metrics. …”
-
6
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
An RSS Based Localization Algorithm in Cellular Networks
Published 2011Get full text
Get full text
Get full text
article -
8
Metaheuristic Algorithm for State-Based Software Testing
Published 2018Get full text
Get full text
Get full text
Get full text
article -
9
-
10
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The findings are presented along with additional recommendations for increasing RDA performance based on the analysis. The readers of this paper will gain a grasp of the RD algorithm and its optimization ability to determine whether this algorithm is appropriate for their particular business, research, or industrial needs.…”
Get full text
Get full text
-
11
An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling
Published 2016“…One major contribution of this research is the incorporation of uncertainty to optimize project duration based on resource allocation.…”
Get full text
-
12
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. …”
Get full text
-
13
-
14
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
15
A Comparative Study of RSA-Based Cryptographic Algorithms
Published 2005Get full text
Get full text
article -
16
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2003Get full text
Get full text
article -
17
A Comparative Study of RSA based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
18
A matrix-based damage assessment and recovery algorithm
Published 2014“…In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …”
Get full text
Get full text
Get full text
conferenceObject -
19
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
20
Belief selection in point-based planning algorithms for POMDPs
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject