Zeitschriftenartikel zum Thema „Algorithm“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Algorithm" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Gangavane, Ms H. N. "A Comparison of ABK-Means Algorithm with Traditional Algorithms." International Journal of Trend in Scientific Research and Development Volume-1, Issue-4 (2017): 614–21. http://dx.doi.org/10.31142/ijtsrd2197.
Der volle Inhalt der QuelleJay, Kishore Sahani, and Kumar Yadav Arvind. "The Bees Algorithms in Optimization: An Overview." MATHEMATICS EDUCATION LV, no. 3, September 2021 (2021): 20–28. https://doi.org/10.5281/zenodo.7275730.
Der volle Inhalt der QuelleToleushova, A. T., D. M. Uypalakova, and A. B. Imansakipova. "SIGNATURE RECOGNITION ALGORITHMS. BEZIER ALGORITHM." Bulletin of Shakarim University. Technical Sciences, no. 3(7) (February 10, 2023): 47–53. http://dx.doi.org/10.53360/2788-7995-2022-1(5)-7.
Der volle Inhalt der QuelleLian, Jian, Yan Zhang, and Cheng Jiang Li. "An Efficient K-Shortest Paths Based Routing Algorithm." Advanced Materials Research 532-533 (June 2012): 1775–79. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1775.
Der volle Inhalt der QuelleWisam, Abdulelah Qasim. "A HYBRID ALGORITHM BASED ON INVASIVE WEED OPTIMIZATION ALGORITHM AND GREY WOLF OPTIMIZATION ALGORITHM." International Journal of Artificial Intelligence and Applications (IJAIA) 11, January (2020): 31–44. https://doi.org/10.5281/zenodo.3690787.
Der volle Inhalt der QuelleCiric, Vladimir, Aleksandar Cvetkovic, Ivan Milentijevic, and Oliver Vojinovic. "All-Pairs Shortest Paths Algorithm for Regular 2D Mesh Topologies." JUCS - Journal of Universal Computer Science 22, no. (11) (2016): 1437–55. https://doi.org/10.3217/jucs-022-11-1437.
Der volle Inhalt der QuelleShaw, Dr Shaik Mohiddin, Dr Dharmaiah Gurram, Hari Krishna Gurram, and Ramakrishna Gurram. "Transitive Closure Algorithm using Binary OR Operation: Primes Algorithm, GHK Algorithm." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 03, no. 02 (2015): 01–05. http://dx.doi.org/10.9756/sijcsea/v3i2/03030100101.
Der volle Inhalt der QuelleHuang, Yuan Jiang, and Jie Huang. "A New Feature Detection Algorithm Based on RANSAC." Advanced Materials Research 971-973 (June 2014): 1477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1477.
Der volle Inhalt der QuelleDeghbouch, Hicham, and Fatima Debbat. "Hybrid Bees Algorithm with Grasshopper Optimization Algorithm for Optimal Deployment of Wireless Sensor Networks." Inteligencia Artificial 24, no. 67 (2021): 18–35. http://dx.doi.org/10.4114/intartif.vol24iss67pp18-35.
Der volle Inhalt der QuelleSami N. Hussein and Nazar K. Hussein. "Improving Moth-Flame Optimization Algorithm by using Slime-Mould Algorithm." Tikrit Journal of Pure Science 27, no. 1 (2022): 99–109. http://dx.doi.org/10.25130/tjps.v27i1.86.
Der volle Inhalt der QuelleOkazaki, Hiroyuki, Yosiki Aoki, and Yasunari Shidama. "Extended Euclidean Algorithm and CRT Algorithm." Formalized Mathematics 20, no. 2 (2012): 175–79. http://dx.doi.org/10.2478/v10037-012-0020-2.
Der volle Inhalt der QuelleChen, Zheyuan, Jiani Lu, Yuqi Shang, and Diwen Xu. "Path planning algorithms of sweeping robots." Applied and Computational Engineering 41, no. 1 (2024): 99–105. http://dx.doi.org/10.54254/2755-2721/41/20230716.
Der volle Inhalt der QuelleKulkarni, Anuj, Saish Padave, Satyam Shrivastava, and Mrs Vidya Kawtikwar. "Algorithm Visualizer." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 1818–23. http://dx.doi.org/10.22214/ijraset.2023.54837.
Der volle Inhalt der QuelleBeth, T., and D. Gollman. "Algorithm engineering for public key algorithms." IEEE Journal on Selected Areas in Communications 7, no. 4 (1989): 458–66. http://dx.doi.org/10.1109/49.17708.
Der volle Inhalt der QuelleYazdani, Maziar, and Fariborz Jolai. "Lion Optimization Algorithm (LOA): A nature-inspired metaheuristic algorithm." Journal of Computational Design and Engineering 3, no. 1 (2015): 24–36. http://dx.doi.org/10.1016/j.jcde.2015.06.003.
Der volle Inhalt der QuelleOzkan, Ramazan, and Ruya Samli. "Flood algorithm: a novel metaheuristic algorithm for optimization problems." PeerJ Computer Science 10 (October 2, 2024): e2278. http://dx.doi.org/10.7717/peerj-cs.2278.
Der volle Inhalt der QuelleAlaa, A. Alomoush, Rahman A. Alsewari Abdul, Z. Zamli Kamal, Alrosan Ayat, Alomoush Waleed, and Alissa Khalid. "Enhancing three variants of harmony search algorithm for continuous optimization problems." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2343–49. https://doi.org/10.11591/ijece.v11i3.pp2343-2349.
Der volle Inhalt der QuelleErdemir, Erkan. "Hybrid algorithm proposal for optimizing benchmarking problems: Salp swarm algorithm enhanced by arithmetic optimization algorithm." International Journal of Industrial Engineering Computations 14, no. 2 (2023): 309–22. http://dx.doi.org/10.5267/j.ijiec.2023.1.002.
Der volle Inhalt der QuelleAndriansyah, Andriansyah, and Prima Denny Sentia. "PENENTUAN RUTE KENDARAAN PADA SISTEM DISTRIBUSI LOGISTIK PASCA BENCANA (STUDI KASUS)." Jurnal Manajemen Industri dan Logistik 2, no. 1 (2018): 79–89. http://dx.doi.org/10.30988/jmil.v2i1.28.
Der volle Inhalt der QuellePeng, Qiang, Renjun Zhan, Husheng Wu, and Meimei Shi. "Comparative Study of Wolf Pack Algorithm and Artificial Bee Colony Algorithm." International Journal of Swarm Intelligence Research 15, no. 1 (2024): 1–24. http://dx.doi.org/10.4018/ijsir.352061.
Der volle Inhalt der QuelleChen, Zhenpeng, Yuanjie Zheng, Xiaojie Li, et al. "Interactive Trimap Generation for Digital Matting Based on Single-Sample Learning." Electronics 9, no. 4 (2020): 659. http://dx.doi.org/10.3390/electronics9040659.
Der volle Inhalt der QuelleJiang, Dazhi, and Zhun Fan. "The Algorithm for Algorithms: An Evolutionary Algorithm Based on Automatic Designing of Genetic Operators." Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/474805.
Der volle Inhalt der QuelleHuang, Yuxuan, and Yiming Ren. "A new interpolation algorithm based on Hibbard-Laroche algorithm and its superiority." Applied and Computational Engineering 15, no. 1 (2023): 119–33. http://dx.doi.org/10.54254/2755-2721/15/20230822.
Der volle Inhalt der QuelleAbabneh, Jehad. "Greedy particle swarm and biogeography-based optimization algorithm." International Journal of Intelligent Computing and Cybernetics 8, no. 1 (2015): 28–49. http://dx.doi.org/10.1108/ijicc-01-2014-0003.
Der volle Inhalt der QuelleNico, Nico, Novrido Charibaldi, and Yuli Fauziah. "Comparison of Memetic Algorithm and Genetic Algorithm on Nurse Picket Scheduling at Public Health Center." International Journal of Artificial Intelligence & Robotics (IJAIR) 4, no. 1 (2022): 9–23. http://dx.doi.org/10.25139/ijair.v4i1.4323.
Der volle Inhalt der QuelleHiendro, Ayong. "Projectile-target search algorithm: a stochastic metaheuristic optimization technique." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3772. http://dx.doi.org/10.11591/ijece.v9i5.pp3772-3778.
Der volle Inhalt der QuelleAyong, Hiendro. "Projectile-target search algorithm: a stochastic metaheuristic optimization technique." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 3772–78. https://doi.org/10.11591/ijece.v9i5.pp3772-3778.
Der volle Inhalt der QuelleTriasih, Rina, Finny Fitry Yani, Diah Asri Wulandari, et al. "Treatment-Decision Algorithm of Child TB: Evaluation of WHO Algorithm and Development of Indonesia Algorithm." Tropical Medicine and Infectious Disease 10, no. 4 (2025): 106. https://doi.org/10.3390/tropicalmed10040106.
Der volle Inhalt der QuelleZhang, Zhaoyang. "Review on String-Matching Algorithm." SHS Web of Conferences 144 (2022): 03018. http://dx.doi.org/10.1051/shsconf/202214403018.
Der volle Inhalt der QuelleLi, Yifeng, and Ying Tan. "Hierarchical Collaborated Fireworks Algorithm." Electronics 11, no. 6 (2022): 948. http://dx.doi.org/10.3390/electronics11060948.
Der volle Inhalt der QuelleZeng, Yi, Shiqun Yin, Jiangyue Liu, and Miao Zhang. "Research of Improved FP-Growth Algorithm in Association Rules Mining." Scientific Programming 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/910281.
Der volle Inhalt der QuelleRatseev, S. M., and O. I. Cherevatenko. "ON DECODING ALGORITHMS FOR GENERALIZED REED — SOLOMON CODES WITH ERRORS AND ERASURES." Vestnik of Samara University. Natural Science Series 26, no. 3 (2020): 17–29. http://dx.doi.org/10.18287/2541-7525-2020-26-3-17-29.
Der volle Inhalt der QuelleMitsos, Alexander, Jaromił Najman, and Ioannis G. Kevrekidis. "Optimal deterministic algorithm generation." Journal of Global Optimization 71, no. 4 (2018): 891–913. http://dx.doi.org/10.1007/s10898-018-0611-8.
Der volle Inhalt der QuelleLiu, Zizhuo. "Investigation of progress and application related to Multi-Armed Bandit algorithms." Applied and Computational Engineering 37, no. 1 (2024): 155–59. http://dx.doi.org/10.54254/2755-2721/37/20230496.
Der volle Inhalt der QuelleBai, Xiaotong, Yuefeng Zheng, Yang Lu, and Yongtao Shi. "Chain hybrid feature selection algorithm based on improved Grey Wolf Optimization algorithm." PLOS ONE 19, no. 10 (2024): e0311602. http://dx.doi.org/10.1371/journal.pone.0311602.
Der volle Inhalt der QuelleChallenger, Moharram, Elif Haytaoglu, Gorkem Tokatli, Orhan Dagdeviren, and Kayhan Erciyes. "A Hybrid Distributed Mutual Exclusion Algorithm for Cluster-Based Systems." Mathematical Problems in Engineering 2013 (2013): 1–15. http://dx.doi.org/10.1155/2013/703414.
Der volle Inhalt der QuelleTilahun, Surafel Luleseged, and Hong Choon Ong. "Prey-Predator Algorithm: A New Metaheuristic Algorithm for Optimization Problems." International Journal of Information Technology & Decision Making 14, no. 06 (2015): 1331–52. http://dx.doi.org/10.1142/s021962201450031x.
Der volle Inhalt der QuelleYE, DESHI, and QINMING HE. "WORST-CASE PERFORMANCE EVALUATION ON MULTIPROCESSOR TASK SCHEDULING WITH RESOURCE AUGMENTATION." International Journal of Foundations of Computer Science 22, no. 04 (2011): 971–82. http://dx.doi.org/10.1142/s0129054111008519.
Der volle Inhalt der QuelleHan, Zhonghai, Haotian Sun, Junfu Huang, Jiejie Xu, Yu Tang, and Xintian Liu. "Path Planning Algorithms for Smart Parking: Review and Prospects." World Electric Vehicle Journal 15, no. 7 (2024): 322. http://dx.doi.org/10.3390/wevj15070322.
Der volle Inhalt der QuelleBrooks, Stephen P. "Algorithms AS 298: A Hybrid Optimization Algorithm." Applied Statistics 44, no. 4 (1995): 530. http://dx.doi.org/10.2307/2986143.
Der volle Inhalt der QuelleJobson, K. "International Psychopharmacology Algorithm Project: Algorithms in Psychopharmacology." International Journal of Psychiatry in Clinical Practice 1, sup1 (1997): S3. http://dx.doi.org/10.3109/13651509709024748.
Der volle Inhalt der QuelleChatain, Peter, Rocky Garg, and Lauren Tompkins. "Evolutionary Algorithms for Tracking Algorithm Parameter Optimization." EPJ Web of Conferences 251 (2021): 03071. http://dx.doi.org/10.1051/epjconf/202125103071.
Der volle Inhalt der QuelleS, Gajawada. "Lord Rama Devotees Algorithm: A New Human-Inspired Metaheuristic Optimization Algorithm." Advances in Robotic Technology 1, no. 1 (2023): 1–2. http://dx.doi.org/10.23880/art-16000105.
Der volle Inhalt der QuelleKaya, Ebubekir, Ceren Baştemur Kaya, Emre Bendeş, Sema Atasever, Başak Öztürk, and Bilgin Yazlık. "Training of Feed-Forward Neural Networks by Using Optimization Algorithms Based on Swarm-Intelligent for Maximum Power Point Tracking." Biomimetics 8, no. 5 (2023): 402. http://dx.doi.org/10.3390/biomimetics8050402.
Der volle Inhalt der QuelleNursania Simbolon and Yahfizham Yahfizham. "Studi Literartur Algoritma Pemograman Pada Pembelajaran Matematika." Jurnal Elektronika dan Teknik Informatika Terapan ( JENTIK ) 1, no. 4 (2023): 147–57. http://dx.doi.org/10.59061/jentik.v1i4.510.
Der volle Inhalt der QuelleWu, Hai Fei, and Tong Zhao. "A Study of MRife Algorithm and CSB Algorithm on Frequency Online Estimation." Applied Mechanics and Materials 128-129 (October 2011): 789–93. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.789.
Der volle Inhalt der QuelleYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Der volle Inhalt der QuelleWheeler, Bradley J., and Hassan A. Karimi. "Enhancing Hyperspectral Anomaly Detection Algorithm Comparisons: Leveraging Dataset and Algorithm Characteristics." Remote Sensing 16, no. 20 (2024): 3879. http://dx.doi.org/10.3390/rs16203879.
Der volle Inhalt der QuelleBhagya Sri, Mukku, Rachita Bhavsar, and Preeti Narooka. "String Matching Algorithms." International Journal Of Engineering And Computer Science 7, no. 03 (2018): 23769–72. http://dx.doi.org/10.18535/ijecs/v7i3.19.
Der volle Inhalt der QuelleLi, Gang. "Research on Smartphone Trojan Detection Based on the Wireless Sensor Network." Security and Communication Networks 2022 (July 9, 2022): 1–7. http://dx.doi.org/10.1155/2022/2455102.
Der volle Inhalt der Quelle