Search alternatives:
initialization algorithm » optimization algorithm (Expand Search), optimization algorithms (Expand Search)
resource initialization » resource utilization (Expand Search)
initialization algorithm » optimization algorithm (Expand Search), optimization algorithms (Expand Search)
resource initialization » resource utilization (Expand Search)
-
1
-
2
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…Initially, the optimization model and convergence characteristics of JAYA algorithm are carefully analyzed. …”
Get full text
-
3
-
4
An evolutionary algorithm for solving the geometrically constrained site layout problem
Published 2017“…This paper presents an investigation of applying an evolutionary approach to optimally solve the aforementioned layout problem. The proposed algorithm is two-phases: an initialization phase that generates an initial population of layouts through a sequence of mutation operations, and a reproduction phase that evolve the layouts generated in phase one through a sequence of genetic operations aiming at finding an optimal layout. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
-
6
A quantum algorithm for evolving open quantum dynamics on quantum computing devices
Published 2020“…This allows the evolution of the initial state through unitary quantum gates, while using significantly less resource than required by the conventional Stinespring dilation. …”
-
7
-
8
-
9
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. Initially, the features are grouped randomly to increase the probability of making them participating in the generation of different groups, and sorted based on their accuracy scores. …”
-
10
-
11
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…A mapping function-based initial regression analysis is made to depict the margins of state estimate in the presence of data-injection. …”
-
12
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…Next, we propose an extension algorithm to further minimize the UAV’s flight distance for cases where the initial and final UAV locations are known a priori. …”
Get full text
Get full text
Get full text
Get full text
article -
13
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
14
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
15