Search alternatives:
other optimization » motor optimization (Expand Search), spider optimization (Expand Search), based optimization (Expand Search)
warm optimization » swarm optimization (Expand Search), whale optimization (Expand Search), based optimization (Expand Search)
aim » aims (Expand Search)
basic » basis (Expand Search)
other optimization » motor optimization (Expand Search), spider optimization (Expand Search), based optimization (Expand Search)
warm optimization » swarm optimization (Expand Search), whale optimization (Expand Search), based optimization (Expand Search)
aim » aims (Expand Search)
basic » basis (Expand Search)
-
1
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…The proposed method is based on enhancing the search process of the Prairie Dog Optimization Algorithm (PDOA) by using the primary updating mechanism of the Dwarf Mongoose Optimization Algorithm (DMOA). …”
Get full text
-
2
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
3
Optimizing transparent photovoltaic integration with battery energy storage systems in greenhouse: a daily light integral-constrained economic analysis considering BESS degradation
Published 2025“…This study conducts a feasibility analysis of integrating Battery Energy Storage Systems (BESSs) with STPV systems in greenhouse agriculture, considering the Daily Light Integral (DLI) requirement for different crops as the primary constraint. Employing an enhanced Firefly Algorithm (FA) to optimize the PV cover ratio and BESS capacity, the analysis aims to maximize the Net Present Value (NPV) over a 25-year period, serving as the primary economic parameter. …”
-
4
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
Published 2024“…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …”
-
5
Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas
Published 2024“…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
-
6
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”