Search alternatives:
algorithm harding » algorithm using (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
algorithm harding » algorithm using (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
-
1
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
2
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
3
-
4
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
5
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…<p>Neural networks have been successfully employed in various domains such as classification, regression and clustering, etc. Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …”
-
6
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
7
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The benchmark problem used is the floorplanning of very large scale integrated (VLSI) circuits. This is a hard multi-criteria optimization problem. Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …”
Get full text
article -
8
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018Get full text
Get full text
Get full text
masterThesis -
9
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
10
A parallel tabu search algorithm for VLSI standard-cell placement
Published 2000“…VLSI standard-cell placement is an NP-hard problem to which various heuristics have been applied. …”
Get full text
Get full text
article -
11
-
12
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
Published 2020“…It is well known that optimizing cell placement for even a single objective namely total wire length is a hard problem to solve. Due to imprecise nature of objective values, fuzzy logic is incorporated in the design of aggregating function. …”
Get full text
article -
13
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
14
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
Get full text
article -
15
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…<p dir="ltr">Load balancing is a serious problem in cloud computing that makes it challenging to ensure the proper functioning of services contiguous to the Quality of Service, performance assessment, and compliance to the service contract as demanded from cloud service providers (CSP) to organizations. …”
-
16
-
17
-
18
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
-
19
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
20