يعرض 1 - 5 نتائج من 5 نتيجة بحث عن '(( binary base wolf optimization algorithm ) OR ( final state robust optimization algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…The performance of all 15 of the algorithms is likely to deteriorate due to certain transformations, while the 4 state-of-the-art metaheuristics are less affected by transformations such as the shifting of the global optimal point away from the center of the search space. …"
  2. 2

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors حسب Sharaf, Omar Z.

    منشور في 2016
    "…Finally, using the developed design models and simulation algorithms, constrained non-linear multi-variable geometric optimization of the assembly components has been carried out to obtain minimum pumping power, maximum extractor heat transfer coefficient, and maximum thermoelectric power output. …"
    احصل على النص الكامل
    article
  3. 3

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  4. 4

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns حسب Md Ferdous Wahid (13485799)

    منشور في 2023
    "…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …"
  5. 5

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"