بدائل البحث:
algorithm flow » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
algorithm flow » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
-
1
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
منشور في 2024"…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
-
2
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
-
3
Radial basis function networks for contingency analysis of bulkpower systems
منشور في 1999"…The performance of the RBFN is compared with a standard AC load flow algorithm…"
احصل على النص الكامل
احصل على النص الكامل
article -
4
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
5
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
6
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
-
7
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
-
8
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
منشور في 2017"…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …"
احصل على النص الكامل
article -
9
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
منشور في 2024"…<p dir="ltr">In current work, the unsteady stagnation point’s flow on a special third-grade fuzzy hybrid (Al<sub>2</sub>O<sub>3</sub> +Cu/SA) nanofluid (HNF) through a permeable convective shrinking/stretching sheet has been scrutinized. …"
-
10
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
11
-
12
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
منشور في 2022"…In this work, a dual absorber setup is proposed for the reduction of the harmonic response of single degree of freedom systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
13
A modified optimal design of a vibration absorber for ground motion isolation
منشور في 2014"…For a given stiffness ratio of the system, the optimal mass and damping ratios are obtained analytically using an optimization method based on invariant points of the objective function. Similar to the case of the classical vibration absorber setup, these points are independent of the system damping ratio. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
-
15
Contingency analysis of bulk power system using neural networks
منشور في 1998"…The performance of the RBFN is compared with a standard AC load flow algorithm…"
احصل على النص الكامل
احصل على النص الكامل
article -
16
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
منشور في 2012احصل على النص الكامل
doctoralThesis -
17
Gas pipeline modelling and control
منشور في 2015"…The pipeline input–output, transfer function, pressure and volume flow representations are formulated. …"
احصل على النص الكامل
-
18
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…<p>Material handling systems (MHS) are integral to logistics functions by providing various supports such as handling, moving, and storing materials in manufacturing and service organisations. …"
-
19
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
20
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…We find these pointcuts and primitives to be necessary because they are needed to perform many security hardening practices and, to the best of our knowledge, none of the existing ones can provide their functionalities. Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article