Showing 1 - 20 results of 43 for search '(( ((algorithm follow) OR (algorithm flow)) functional ) OR ( algorithm python function ))*', query time: 0.12s Refine Results
  1. 1

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”
  2. 2

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  3. 3

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  4. 4

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  5. 5

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 6

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. </p><h3>Methods</h3><p dir="ltr">A cohort of Arab patients newly starting on warfarin had their dose calculated using CWD published in www.warfarindosing.org and were followed for 1 month. …”
  7. 7

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  8. 8

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…Moreover, we discuss the different hyperparameter optimization techniques followed in the literature to improve the generalization performance of the RVFL model. …”
  9. 9

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”
  10. 10

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications by Mohieddine Benammar (18103039)

    Published 2019
    “…The contributions of this work are summarized as follows: (1) introducing a new approximation algorithm with high precision and application-based flexibility; (2) introducing a new rational approximation formula that outperforms literature alternatives with the algorithm at higher accuracy requirement; and (3) presenting a practical evaluation index for rational approximations in the literature.…”
  11. 11

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  12. 12

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …”
    Get full text
    Get full text
    Get full text
    article
  13. 13

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  14. 14

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology by Senyuk, Mihail

    Published 2023
    “…Algorithms were tested using the test power system IEEE39. …”
    Get full text
    article
  15. 15

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  16. 16

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet by Imran Siddique (12705185)

    Published 2024
    “…<p dir="ltr">In current work, the unsteady stagnation point’s flow on a special third-grade fuzzy hybrid (A⁢l<sub>2</sub>⁢O<sub>3</sub> +Cu/SA) nanofluid (HNF) through a permeable convective shrinking/stretching sheet has been scrutinized. …”
  17. 17

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  18. 18

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  19. 19
  20. 20

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text