بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
121
A fast exact sequential algorithm for the partial digest problem
منشور في 2016"…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
-
122
A parallel GPU implementation of the timber wolf placement algorithm
منشور في 2015"…This paper describes the implementation of the Timber Wolf placement algorithm using CUDA and demonstrates the applicability of GPUs in accelerating electronic design automation tools. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
123
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
124
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
منشور في 2020"…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …"
احصل على النص الكامل
article -
125
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
منشور في 2002"…In this paper we present a parallel algorithm to solve the above problem for arbitrary graphs using a Hopfield Neural Network model of computation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
126
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
127
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
128
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
منشور في 2024"…Advanced machine learning algorithms are used in this study to figure out the complicated relationship between the crashworthiness parameters of the hexagonal composite ring specimens under lateral compressive, energy absorption, and failure modes. …"
-
129
-
130
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
احصل على النص الكامل
article -
131
A method for optimizing test bus assignment and sizing for system-on-a-chip
منشور في 2017"…We present experimental results that demonstrate the effectiveness of our method while outperforming reported techniques.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
132
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
منشور في 2021"…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …"
-
133
Fuzzified ant colony optimization algorithm for efficient combinational circuits synthesis
منشور في 2004"…Multiobjective optimization of logic circuits based on a fuzzified ant colony (ACO) algorithm is presented. The results obtained using the proposed algorithm are compared to those obtained using SIS in terms of area, delay and power for some known circuits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
134
A parallel optimization algorithm for the maximum clique problem. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
135
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
منشور في 2018"…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
136
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …"
احصل على النص الكامل
article -
137
An ant colony optimization algorithm to improve software quality prediction models
منشور في 2011"…Method This paper presents an adaptive approach that takes already built predictive models and adapts them (one at a time) to new data. We use an ant colony optimization algorithm in the adaptation process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
138
The buffered work-pool approach for search-tree based optimization algorithms
منشور في 2017"…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
139
A novel design technique for generating building form
منشور في 2018"…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…"
احصل على النص الكامل
-
140
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis