Showing 1 - 6 results of 6 for search '(( primary aim other optimization algorithm ) OR ( binary basic warm optimization algorithm ))', query time: 0.09s Refine Results
  1. 1

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…The proposed method is based on enhancing the search process of the Prairie Dog Optimization Algorithm (PDOA) by using the primary updating mechanism of the Dwarf Mongoose Optimization Algorithm (DMOA). …”
    Get full text
  2. 2
  3. 3

    Optimizing transparent photovoltaic integration with battery energy storage systems in greenhouse: a daily light integral-constrained economic analysis considering BESS degradation by Mohammadreza Gholami (17032317)

    Published 2025
    “…This study conducts a feasibility analysis of integrating Battery Energy Storage Systems (BESSs) with STPV systems in greenhouse agriculture, considering the Daily Light Integral (DLI) requirement for different crops as the primary constraint. Employing an enhanced Firefly Algorithm (FA) to optimize the PV cover ratio and BESS capacity, the analysis aims to maximize the Net Present Value (NPV) over a 25-year period, serving as the primary economic parameter. …”
  4. 4

    Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks by Amirhossein Taherpour (19273879)

    Published 2024
    “…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …”
  5. 5

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas by Marwan Dhuheir (19170898)

    Published 2024
    “…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …”
  6. 6

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”