Showing 1 - 5 results of 5 for search '(( binary base wolf optimization algorithm ) OR ( final state robust optimization algorithm ))', query time: 0.09s Refine Results
  1. 1

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms by Zhongqiang Ma (13765801)

    Published 2023
    “…The performance of all 15 of the algorithms is likely to deteriorate due to certain transformations, while the 4 state-of-the-art metaheuristics are less affected by transformations such as the shifting of the global optimal point away from the center of the search space. …”
  2. 2

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…Finally, using the developed design models and simulation algorithms, constrained non-linear multi-variable geometric optimization of the assembly components has been carried out to obtain minimum pumping power, maximum extractor heat transfer coefficient, and maximum thermoelectric power output. …”
    Get full text
    article
  3. 3

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  4. 4

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
  5. 5

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”