يعرض 141 - 160 نتائج من 348 نتيجة بحث عن '(((( algorithm ai function ) OR ( algorithm fa function ))) OR ( algorithm a function ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 141
  2. 142

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm حسب Badreddine Kanouni (23073244)

    منشور في 2025
    "…This paper introduces a novel multi-trial vector-based sine cosine algorithm (MTV-SCA) for the identification of seven unknown parameters of PEMFCs. …"
  3. 143
  4. 144

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization حسب Abu Zitar, Raed

    منشور في 2024
    "…The goal is to select a set of sensors based on norms of weighted distances cost function. …"
    احصل على النص الكامل
  5. 145
  6. 146
  7. 147

    Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review حسب Tareq Foqha (17947778)

    منشور في 2023
    "…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. …"
  8. 148

    Single channel speech denoising by DDPG reinforcement learning agent حسب Sania Gul (18272227)

    منشور في 2025
    "…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
  9. 149

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems حسب Agushaka, Jeffrey O.

    منشور في 2022
    "…This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. …"
    احصل على النص الكامل
  10. 150

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
    احصل على النص الكامل
    احصل على النص الكامل
  11. 151

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm حسب Abdelbasset Krama (16870008)

    منشور في 2018
    "…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. …"
  12. 152
  13. 153

    Minimizing using BBO and DFO methods حسب El Zeghondy, Jean

    منشور في 2022
    "…In order to apply this algorithm to real life problems, two numerical methods need to be developed: A numerical method to solve nonlinear differential equations, and a numerical method to nd the minimum of an objective function (given only numerically) in fi nite dimensional spaces. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 154

    Boosting the visibility of services in microservice architecture حسب Ahmet Vedat Tokmak (17773479)

    منشور في 2023
    "…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …"
  15. 155
  16. 156

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …"
  17. 157
  18. 158
  19. 159

    Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme حسب Sudhanshu Ranjan (17151115)

    منشور في 2021
    "…System responses have been critically analyzed under Mine Blast Algorithm (MBA) based proportional–integral–derivative (PID) controllers</p><h2>Other Information</h2><p dir="ltr">Published in: Energy Reports<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2021.10.100" target="_blank">https://dx.doi.org/10.1016/j.egyr.2021.10.100</a></p>…"
  20. 160

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل