Search alternatives:
phase function » taste function (Expand Search)
could function » cost function (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
phase function » taste function (Expand Search)
could function » cost function (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
-
1
Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash
Published 2022“…<p dir="ltr">New algorithms for vapor – liquid (VLE) and liquid - liquid (LLE) equilibrium calculations at constant temperature, pressure and feed phase composition (PT flash), with application to mixtures containing fully dissociating electrolytes are presented. …”
-
2
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
Published 1999“…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
Get full text
Get full text
article -
3
-
4
-
5
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
6
-
7
Computational evluation of protein energy functions
Published 2014“…However, the energy functions proposed so far by biophysicists and biochemists are still in the exploration phase and their usefulness has been demonstrated only individually. …”
Get full text
Get full text
Get full text
conferenceObject -
8
A new multimodulus blind equalization algorithm
Published 2004“…The proposed algorithm is obtained by removing the discontinuity found in the RCA cost function. …”
Get full text
Get full text
article -
9
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…<p>Neural networks have been successfully employed in various domains such as classification, regression and clustering, etc. Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …”
-
10
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
11
A comparative study of RSA based digital signature algorithms
Published 2006“…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
12
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
Get full text
article -
13
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…The proposed algorithm, which is mainly based on genetic algorithms incorporates tabu search method to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
article -
14
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
Published 2020“…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
article -
15
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
16
-
17
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
-
18
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…In the initial phase, the proposed HNIDS utilizes hybrid EGA-PSO methods to enhance the minor data samples and thus produce a balanced data set to learn the sample attributes of small samples more accurately. …”
-
19
A simplified sliding‐mode control method for multi‐level transformerless DVR
Published 2022“…Second, an effective method based on charging/discharging conditions of DC capacitors is proposed for balancing capacitor voltages using relevant switching state rather than combining DC voltage error with the inductor current error through a suitable weighting factor in forming the cost function. Therefore, the weighting factor necessity in the control algorithm is eliminated. …”
-
20
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…The noisy speech is first converted from the time domain to the time–frequency (TF) domain by taking its short-time Fourier transform (STFT), and then two separate DDPG agents are trained on the magnitude and phase components of the STFT. The reward function used for training these agents is the relative perceptual quality score of speech. …”