Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
141
Fuzzified ant colony optimization algorithm for efficient combinational circuits synthesis
Published 2004“…Multiobjective optimization of logic circuits based on a fuzzified ant colony (ACO) algorithm is presented. The results obtained using the proposed algorithm are compared to those obtained using SIS in terms of area, delay and power for some known circuits. …”
Get full text
Get full text
article -
142
A parallel optimization algorithm for the maximum clique problem. (c2008)
Published 2008Get full text
Get full text
masterThesis -
143
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
Get full text
Get full text
Get full text
masterThesis -
144
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …”
Get full text
article -
145
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…Method This paper presents an adaptive approach that takes already built predictive models and adapts them (one at a time) to new data. We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
146
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
147
A novel design technique for generating building form
Published 2018“…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
Get full text
-
148
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
149
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
150
A new tabu search algorithm for the long-term hydro scheduling problem
Published 2002“…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …”
Get full text
Get full text
article -
151
-
152
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
Published 2024“…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
Get full text
article -
153
Digital circuit design through simulated evolution (SimE)
Published 2003“…In this paper, the use of simulated evolution (SimE) algorithm in the design of digital logic circuits is proposed. …”
Get full text
Get full text
article -
154
A quantum algorithm for evolving open quantum dynamics on quantum computing devices
Published 2020“…<p dir="ltr">Designing quantum algorithms for simulating quantum systems has seen enormous progress, yet few studies have been done to develop quantum algorithms for open quantum dynamics despite its importance in modeling the system-environment interaction found in most realistic physical models. …”
-
155
Design of a TE-pass reflection mode optical polarizer
Published 2003Get full text
Get full text
article -
156
Design of a vibration absorber for harmonically forced damped systems
Published 2013“…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
article -
157
Power system output feedback stabilizer design via geneticalgorithms
Published 1997“…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
Get full text
Get full text
article -
158
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
-
159
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography
Published 2024“…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
-
160
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”