Search alternatives:
wolf optimization » whale optimization (Expand Search), policy optimization (Expand Search), swarm optimization (Expand Search)
base » based (Expand Search), case (Expand Search)
wolf optimization » whale optimization (Expand Search), policy optimization (Expand Search), swarm optimization (Expand Search)
base » based (Expand Search), case (Expand Search)
-
1
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…The performance of all 15 of the algorithms is likely to deteriorate due to certain transformations, while the 4 state-of-the-art metaheuristics are less affected by transformations such as the shifting of the global optimal point away from the center of the search space. …”
-
2
Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors
Published 2016“…Finally, using the developed design models and simulation algorithms, constrained non-linear multi-variable geometric optimization of the assembly components has been carried out to obtain minimum pumping power, maximum extractor heat transfer coefficient, and maximum thermoelectric power output. …”
Get full text
article -
3
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
4
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. …”
-
5
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”