Search alternatives:
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithms a (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
b function » _ functional (Expand Search)
a function » _ functional (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithms _ (Expand Search), algorithms a (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
b function » _ functional (Expand Search)
a function » _ functional (Expand Search)
-
161
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
162
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
163
Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme
Published 2021“…System responses have been critically analyzed under Mine Blast Algorithm (MBA) based proportional–integral–derivative (PID) controllers</p><h2>Other Information</h2><p dir="ltr">Published in: Energy Reports<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2021.10.100" target="_blank">https://dx.doi.org/10.1016/j.egyr.2021.10.100</a></p>…”
-
164
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
165
Android Malware Detection Using Machine Learning
Published 2024“…Malware, or malicious software, poses a significant threat to systems and networks. Malware attacks are becoming extremely sophisticated, and the ability to detect and prevent them is becoming more challenging. …”
Get full text
article -
166
-
167
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
168
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
Published 2020“…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
-
169
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…In this work, the unique optimal absorber parameters are determined with the aim of minimizing the maximum of the primary system amplitude. For a given stiffness ratio of the system, the optimal mass and damping ratios are obtained analytically using an optimization method based on invariant points of the objective function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
170
-
171
-
172
Particle swarm optimization for multimachine power systemstabilizer design
Published 2001“…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
Get full text
Get full text
article -
173
Parallel tabu search in a heterogeneous environment
Published 2003“…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
Get full text
Get full text
article -
174
A quadratic kernel for 3-set packing
Published 2017“…We present a reduction procedure that takes an arbitrary instance of the 3-Set Packing problem and produces an equivalent instance whose number of elements is bounded by a quadratic function of the input parameter. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
175
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
176
Platoon Transitional Maneuver Control System: A Review
Published 2021“…These benefits can be realized through vehicle platooning. A vehicle platoon is composed of a group of connected automated vehicles (CAVs) traveling together at consensual speed, following the leading vehicle (leader) while maintaining a prespecified inter-vehicle distance. …”
-
177
Machine Learning Model for a Sustainable Drilling Process
Published 2023Get full text
doctoralThesis -
178
Design of a TE-pass reflection mode optical polarizer
Published 2003“…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. …”
Get full text
Get full text
article -
179
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
Get full text
Get full text
Get full text
masterThesis -
180
On Optimizing Backoff Procedure to Enhance Throughput and Fairness For Wireless LANs
Published 2006“…In this paper, we propose and evaluate a novel algorithm to enhance the backoff procedure of DCF. …”
Get full text
Get full text
article