Search alternatives:
algorithm wave » algorithm novel (Expand Search), algorithm fa (Expand Search), algorithm a (Expand Search)
algorithm flow » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
wave function » taste function (Expand Search)
algorithm wave » algorithm novel (Expand Search), algorithm fa (Expand Search), algorithm a (Expand Search)
algorithm flow » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
wave function » taste function (Expand Search)
-
1
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”
-
2
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
3
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
4
-
5
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. In SASA, the incident wave that is the first coming wave-packet is taken as a mother wavelet. …”
Get full text
-
6
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…Within the system, both sheets function as IRS. The aim is to enhance the secrecy capacity (SC) of the system by optimizing the beamforming weights at the VLC fixtures, the beamforming weights at the mmWave AP, the mirror array configurations, and the phase shift vector while meeting specific power constraints. …”
-
7
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…These constraints are managed via dynamically modified, nonstationary penalty functions. The structures are subject to gravity, wind, wave, and earthquake loading conditions. …”
Get full text
article -
8
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…The performance of the RBFN is compared with a standard AC load flow algorithm…”
Get full text
Get full text
article -
9
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
10
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
Get full text
Get full text
Get full text
article -
11
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
12
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…<p>This work aims to provide an effective hybrid beam forming method with Dual-Deep-Network to overcome overhead for mm-wave massive MIMO systems. In this paper, a Dual-Deep-Network technique is described for the extraction of statistical structures from a hybrid beam forming model based on mmWave logics, as well as training logic for the network map functions. …”
-
13
-
14
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
15
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
Published 2024“…<p dir="ltr">In current work, the unsteady stagnation point’s flow on a special third-grade fuzzy hybrid (Al<sub>2</sub>O<sub>3</sub> +Cu/SA) nanofluid (HNF) through a permeable convective shrinking/stretching sheet has been scrutinized. …”
-
16
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
17
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
18
-
19
Contingency analysis of bulk power system using neural networks
Published 1998“…The performance of the RBFN is compared with a standard AC load flow algorithm…”
Get full text
Get full text
article -
20
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis