-
81
Intelligent optimization algorithm based on benchmarking
Published 2018-07-01“…Many of the issues in scientific research,engineeringand management can be transformed into optimization problems.The various methods applied to these problems were a variety of models.Designing different methods was designing different models.The theme was to model the benchmarking philosophy in business management as a meta-heuristic search method for single objective bound-constrained real-parameter optimization problems.According to the principle of Occam’s Razor,many complicated operators and their probability tuning rules were abandoned and a simple framework was used to organize the core operators to achieve the effect of many composition algorithms.…”
Get full text
Article -
82
Korselt Numbers Through Computational Algorithms
Published 2023-12-01“…Consequently, we introduced proper corrections for them. Finally, many notes have been taken and directed us to build and develop a number of complicated algorithms, some of them in order to find Korselt sets for relatively large numbers in an effective way in a short time which may require a great time and need tedious effort if it is to be calculated manually…”
Get full text
Article -
83
Algorithms for the Diagnosis and Treatment of Pulmonary Hemorrhage
Published 2013-04-01“…Action algorithms in relation to the etiology, pathogenesis, and degree of pulmonary hemorrhage have been composed for physicians of different specialties. …”
Get full text
Article -
84
ALGORITHM FOR SOLVING EXTREME SCHEDULING PROBLEMS
Published 2016-08-01“…Tools to solve suchproblems are included in the decisionsupport system ACS in many businesses.The effectiveness of the proposed algorithm allows solving with it specifi c for practice large-scale problems.…”
Get full text
Article -
85
Comparative analysis of integer factorization algorithms
Published 2015-10-01“…In this work we implement 4 integer factorization algorithms using GMP library on c++ and compare the running time of these algorithms. …”
Get full text
Article -
86
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…A binary key matrix and weight matrix are used as a secret key to protect the hidden information. The algorithm can hide as many as bits of data in the image by changing one bit in each block of size . …”
Get full text
Article -
87
Algorithm profiling for architectures with dataflow accelerators
Published 2025-07-01“…This is often true with algorithms that work with big data and that can process multiple iterations independently, e.g., while simulating certain phenomena in many elementary volumes. …”
Get full text
Article -
88
Proposing an Improved Version of the Bat Algorithm
Published 2024-12-01“…Although the bat algorithm has many practical benefits, it also has some disadvantages. …”
Get full text
Article -
89
An Effective Genetic Algorithm for Mixed Precision
Published 2025-01-01“…In this paper, we present a genetic algorithm-based approach for tuning the precision of floating-point computations. …”
Get full text
Article -
90
-
91
The Treatment Algorithm for Meibomyitis, Hordeolum and Halazion
Published 2019-12-01“…This article presents an algorithm for the prevention and treatment of this group of patients, which involves a certain sequence of therapeutic and preventive measures, depending on the severity and duration of the inflammatory process. …”
Get full text
Article -
92
A systematic literature review of diabetes prediction using metaheuristic algorithm-based feature selection: Algorithms and challenges method
Published 2025-03-01“…To address the problems, we can employ metaheuristic algorithm-based feature selection. However, there has been limited research on metaheuristic algorithm-based feature selections for Diabetes prediction. …”
Get full text
Article -
93
Application of Traditional Denoising Algorithms to Zoom-In the Color Images
Published 2010-12-01“…In this paper many algorithmswere applied to" zoom –in" the images, like traditional algorithms which is used (Linear Averaging) algorithm, (Convolution) algorithm and the proposed algorithms to be the new algorithms in this paper. …”
Get full text
Article -
94
Cuckoo Search Algorithm: Review and its Application
Published 2022-12-01“…But choosing the optimization technology is a big challenge for the user. The cuckoo search algorithm is one of the modern optimization techniques that can replace many of the traditional techniques used, The cuckoo bird use a Levi's flight strategy based on the egg laying method to extract a solution to the problem. …”
Get full text
Article -
95
Exact Algorithms for the Satellite Image Selection Problem
Published 2025-06-01“…The problem is known as satellite image mosaic selection (SIMS).Manual selection of promising images is often impossible, especially when dealing with large AOIs or many photos. To solve the problem, we propose several new exact algorithms using different techniques, such as branch-and-bound or mixed-integer linear programming. …”
Get full text
Article -
96
Firefly Algorithm for Polynomial Bézier Surface Parameterization
Published 2013-01-01“…A classical issue in many applied fields is to obtain an approximating surface to a given set of data points. …”
Get full text
Article -
97
On the Effectiveness of Optimisation Algorithms for Hydrodynamic Lubrication Problems
Published 2025-05-01“…In many applications, it is necessary to optimise the performance of hydrodynamic (HD) bearings. …”
Get full text
Article -
98
Black Hole Algorithm for Software Requirements Prioritization
Published 2025-01-01“…The Black Hole Algorithm (BHA) is a population-based approach. It is among one of the many modern approaches and has been successfully applied to solve optimization problems. …”
Get full text
Article -
99
Inexact Version of Bregman Proximal Gradient Algorithm
Published 2020-01-01“…The supercoercivity of the objective function is necessary for the convergence of this algorithm precluding its use in many applications. …”
Get full text
Article -
100
Mathematical analysis of spectral estimation algorithms resolution
Published 2019-06-01Get full text
Article