Search Results - (( based constructive search algorithm ) OR ( using function based algorithm ))
Search alternatives:
- constructive search »
- based constructive »
- using function »
-
1
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
2
A new HMCR parameter of harmony search for better exploration
Published 2016“…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
Get full text
Get full text
Conference or Workshop Item -
3
A new HMCR parameter of harmony search for better exploration
Published 2015“…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
Get full text
Get full text
Conference or Workshop Item -
4
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…Both MFPA and CPA were first evaluated using twenty-five well-known benchmark functions with different characteristics and seven Congress on Evolutionary Computation (CEC) 2017 test functions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…In the proposed search-based test data generator, a whole constraints analyzer and a fitness function that evolves itself based on the error feedback were proposed. …”
Get full text
Get full text
Get full text
Thesis -
6
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
7
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…The proposed methods show superior results in several benchmark function tests. As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
Get full text
Get full text
Get full text
Article -
8
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…In past IGA works with a small size of population and generations to prevent the user fatigue, in this way small search space is used for evolving solutions. The proposed work is based on the use of objective function for assigning fitness, visualization of multidimensional search space and interaction of user after several generations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. …”
Get full text
Thesis -
10
-
11
Gradient method with multiple damping for large-scale unconstrained optimization
Published 2019“…That is, the proposed method is constructed by combining damping with line search strategies, in which an individual adaptive parameter is proposed to damp the gradient vector while line searches are used to reduce the function value. …”
Get full text
Get full text
Article -
12
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…This study is primarily aimed at investigating two issues in genetic algorithm (GA) and one issue in conformational search (CS) problems. …”
Get full text
Get full text
Thesis -
13
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
14
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…An algorithm vision based page segmentation algorithm will be implemented in this system to extract the data from multiple websites and will be displayed in new website. …”
Get full text
Get full text
Thesis -
15
A Stepper Motor Design Optimization Using
Published 2005“…A C++ program has been successfully developed based on the GAs by using the GAs library. This GAs library is a C++ library that contains tools and built-in components for using GAs to minimize the fitness function. …”
Get full text
Get full text
Monograph -
16
-
17
Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm
Published 2008“…Karnaugh map can provide the simple minimization process for Boolean expression, but it encounters difficulties when the variable is more than four In this research, Genetic Algorithm (GA) technique is used as a tool to search for the optimal solution for the digital circuit structure. …”
Get full text
Get full text
Thesis -
18
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…However, the evaluation function used in the AI is developed based on historical traffic data. …”
Get full text
Get full text
Get full text
Thesis -
19
Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique
Published 2023“…In this work, the core size estimation technique of magnetic nanoparticles (MNPs) using the static magnetization curve obtained from a high-Tc SQUID magnetometer and a metaheuristic inversion technique based on the Particle Swarm Optimizer (PSO) algorithm is presented. …”
Get full text
Get full text
Get full text
Article -
20
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…Finally, a unique fingerprint based key is constructed using a user's fingerprint image and the key used to access and retrieve the private key. …”
Get full text
Get full text
Thesis
