Search alternatives:
whale » whole (Expand Search)
Showing 321 - 340 results of 13,261 for search '(whale OR while) algorithm', query time: 0.16s Refine Results
  1. 321

    Black Hole Algorithm for Software Requirements Prioritization by Norah Ibrahim Alfassam, M. Abdullah-Al-Wadud, Mubarak Rashed Alrashoud

    Published 2025-01-01
    “…Furthermore, the proposed BHA-based solution was evaluated on three real-world datasets (RALIC, Word, and ReleasePlanner), and its performance was compared with that of multiple state-of-the-art algorithms, including Ant Colony Optimization (ACO), Genetic Algorithm (GA), Grey Wolf Optimizer (GWO), Particle Swarm Optimization (PSO), Fitness Dependent Optimizer (FDO), Goose Algorithm (GAO), and Lagrange Elementary Optimization (LEO). …”
    Get full text
    Article
  2. 322

    Algorithm Design for an Online Berth Allocation Problem by Cong Chen, Fanxin Wang, Jiayin Pan, Lang Xu, Hongming Gao

    Published 2024-09-01
    “…The numerical simulation of competitive ratios reveals distinct advantages for different algorithms depending on job size. For smaller job sizes, the Greedy algorithm emerges as the most efficient, while for medium-sized jobs, the RS algorithm proves to be the most effective.…”
    Get full text
    Article
  3. 323
  4. 324

    Algorithms for the management of scars: the importance of systematizing behaviors by Francisco Felipe Góis de Oliveira, Nathalia Moreira De Almeida França, Elvio Bueno Garcia, Leila Blanes, Alessandra Haddad

    Published 2023-08-01
    “…The objective is to carry out a narrative review of the literature on scar management algorithms and create an updated algorithm. …”
    Get full text
    Article
  5. 325

    DIDADTIC TOOLS FOR THE STUDENTS’ ALGORITHMIC THINKING DEVELOPMENT by T. P. Pushkaryeva, T. A. Stepanova, V. V. Kalitina

    Published 2017-12-01
    “…Modern engineers must possess high potential of cognitive abilities, in particular, the algorithmic thinking (AT). In this regard, the training of future experts (university graduates) of technical specialities has to provide the knowledge of principles and ways of designing of various algorithms, abilities to analyze them, and to choose the most optimal variants for engineering activity implementation. …”
    Get full text
    Article
  6. 326

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  7. 327

    Optimization of Electrical Discharge Machining Process by Metaheuristic Algorithms by Nurezayana Zainal, Mohanavali Sithambranathan, Umar Farooq Khattak, Azlan Mohd Zain, Salama A. Mostafa, Ashanira Mat Deris

    Published 2024-03-01
    “…This paper emphasizes optimizing the EDM process using three metaheuristic algorithms: Glowworm Swarm Optimization (GSO), Grey Wolf Optimizer (GWO), and Whale Optimization Algorithm (WOA). …”
    Get full text
    Article
  8. 328

    Investigation of The Effect of Feeding Period in Honey Bee Algorithm by Mustafa Kaya

    Published 2022-12-01
    “…As a result, the analysis results showed that the performance of the artificial bee colony algorithm is very good while solving too complex engineering optimization problems.…”
    Get full text
    Article
  9. 329

    A Survey of Approximation Algorithms for the Power Cover Problem by Jiaming Zhang, Zhikang Zhang, Weidong Li

    Published 2025-08-01
    “…Consequently, minimizing the total power cost of the network while all clients are served has become a crucial research topic. …”
    Get full text
    Article
  10. 330
  11. 331

    Robust machine-learned algorithms for efficient grid operation by Nicolas Christianson, Christopher Yeh, Tongxin Li, Mehdi Hosseini, Mahdi Torabi Rad, Azarang Golmohammadi, Adam Wierman

    Published 2025-01-01
    “…In this work, we propose a learning-augmented algorithm, RobustML, that exploits the good average-case performance of a machine-learned algorithm for minimizing dispatch and ramping costs of dispatchable generation resources while providing provable worst-case guarantees on cost. …”
    Get full text
    Article
  12. 332
  13. 333

    A Bat Algorithm with Mutation for UCAV Path Planning by Gaige Wang, Lihong Guo, Hong Duan, Luo Liu, Heqi Wang

    Published 2012-01-01
    “…This new approach can accelerate the global convergence speed while preserving the strong robustness of the basic BA. …”
    Get full text
    Article
  14. 334

    Methods and effective algorithms for solving multidimensional integral equations by A. B. Samokhin

    Published 2022-12-01
    “…Efficient solution algorithms using fast Fourier transforms are proposed for solving systems of equations obtained using a uniform grid.Conclusions. …”
    Get full text
    Article
  15. 335
  16. 336
  17. 337

    Research on the Raft improved algorithm for anti-Byzantine nodes by WANG Xiaowei, LI Jie

    Published 2025-03-01
    “…On the anti-Byzantine, error logs were not identified in Raft algorithmwhile the error log recognition rate of AntiB-Raft algorithm can reach 100%, meanwhile the consensus delay was 28% lower than the existing algorithm RB-Raft.ConclusionsThe proposed algorithm AntiB-Raft had the capability of anti-Byzantine and reduced consensus delay compared with the existing algorithm RB-Raft and its efficiency was improved significantly.…”
    Get full text
    Article
  18. 338

    Efficient inter mode selection algorithm for H.264 by LU Lu, ZHOU Wei

    Published 2006-01-01
    “…The simulation results show that the algorithm can remarkably decrease the complexity at the encoder while keeping satisfying coding efficiency.…”
    Get full text
    Article
  19. 339

    Chaos-based scramble self-embedding watermarking algorithm by HE Hong-jie, ZHANG Jia-shu

    Published 2006-01-01
    “…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
    Get full text
    Article
  20. 340