يعرض 1 - 20 نتائج من 45 نتيجة بحث عن '(((( algorithm phase functions ) OR ( algorithm flow function ))) OR ( algorithm python function ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
  2. 2

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm حسب Abido, M.A.

    منشور في 1999
    "…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash حسب Ilias K. Nikolaidis (9217172)

    منشور في 2022
    "…In this way, an augmented function (Lagrange function) is formulated which serves as the basis for the equations that govern phase equilibrium. …"
  4. 4

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  5. 5
  6. 6
  7. 7

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…However, the energy functions proposed so far by biophysicists and biochemists are still in the exploration phase and their usefulness has been demonstrated only individually. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8
  9. 9
  10. 10

    A new multimodulus blind equalization algorithm حسب Abrar, Shafayat

    منشور في 2004
    "…The proposed algorithm is obtained by removing the discontinuity found in the RCA cost function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Radial basis function networks for contingency analysis of bulkpower systems حسب Refaee, J.A.

    منشور في 1999
    "…The performance of the RBFN is compared with a standard AC load flow algorithm…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  13. 13
  14. 14

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem حسب Mantawy, A.H.

    منشور في 1999
    "…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem حسب Mantawy, A. H.

    منشور في 2020
    "…The proposed algorithm, which is mainly based on genetic algorithms incorporates tabu search method to generate new population members in the reproduction phase of the genetic algorithm. …"
    احصل على النص الكامل
    article
  16. 16

    Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem حسب Montawy, A.H.

    منشور في 2020
    "…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …"
    احصل على النص الكامل
    article
  17. 17

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  20. 20

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"