Search alternatives:
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
-
1
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
2
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…A 3D finite element model was first developed and validated against available experimental results. …”
-
3
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
4
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
-
5
-
6
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
Get full text
-
7
-
8
-
9
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…This paper presents a parallel algorithm to solve the Clique Partitioning Problem, an NP-complete problem. …”
Get full text
Get full text
article -
10
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
11
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
12
A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading
Published 2020“…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
-
13
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
Published 2021“…So, it becomes relevant to detect classes of uniform hypergraphs that are reconstructible in polynomial time. …”
Get full text
-
14
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
-
15
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
16
-
17
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
Published 2024“…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …”
-
18
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text
-
19
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
Published 2022“…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
-
20
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”