Search alternatives:
data relationship » _ relationship (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
data relationship » _ relationship (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
1
-
2
Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm
Published 2024“…The mathematical design and methodology of the complete PV system were detailed in our prior research, titled "Dynamic and Adaptive Maximum Power Point Tracking Using Sequential Monte Carlo Algorithm for Photovoltaic System" by Odat et al. (2023) [1]. …”
Get full text
Get full text
Get full text
article -
3
Control of nonlinear dynamical systems using genetic algorithms
Published 1997“…This paper introduces a new method for the control of nonlinear systems using genetic algorithms. The proposed method formulates the nonlinear controller design as an optimization problem and genetic algorithms are used in the optimization process. …”
Get full text
Get full text
article -
4
-
5
-
6
-
7
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
-
9
Holistic Design: Optimizing Mechatronic Systems Using Multi Objective Optimization
Published 2015Get full text
doctoralThesis -
10
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…Optimal multiobjective design of robust multimachine power system stabilizers (PSSs) using genetic algorithms is presented in this paper. …”
Get full text
Get full text
article -
11
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…Network integration is common in cyber-physical systems (CPS) to allow for remote access, surveillance, and analysis. …”
Get full text
Get full text
-
12
Power-constrained system-on-a-chip test scheduling using a genetic algorithm
Published 2006“…This paper presents an efficient approach for the test scheduling problem of core-based systems based on a genetic algorithm. The method minimizes the overall test application time of a system-on-a-chip through efficient and compact test schedules. …”
Get full text
Get full text
Get full text
article -
13
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability. …”
-
14
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
15
Predicting Plasma Vitamin C Using Machine Learning
Published 2022“…The low R-squared scores obtained by the models are likely to be due to the low resolution of the NHANES data, particularly the dietary data. This emphasizes the need for high-quality data sets in Precision Nutrition research.…”
-
16
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …”
Get full text
Get full text
Get full text
masterThesis -
17
-
18
-
19
-
20
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”