Showing 21 - 40 results of 57 for search '(((( algorithm flow function ) OR ( algorithm etc function ))) OR ( algorithms within function ))', query time: 0.12s Refine Results
  1. 21

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
  2. 22

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Each cluster in the swarm has its own cluster best position which is the best position within a cluster and the global best position is located by clusters communication. …”
  3. 23

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  4. 24
  5. 25
  6. 26
  7. 27

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…Various objective functions are presented allowing the selection of the output feedback gains to place the closed loop eigenvalues in the left hand side of a vertical line in the complex s plane, within an open sector in the complex s plane, or within a vertical strip in the complex s plane. …”
    Get full text
    Get full text
    article
  8. 28

    Contingency analysis of bulk power system using neural networks by Maghrabi, H.

    Published 1998
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  9. 29
  10. 30

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
  11. 31

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…Moreover, if the transmission rate over the wireless medium is high then the need for compression might be reduced or even eliminated as data is transferred efficiently within a limited amount of time. We evaluate and optimize the performance of the proposed adaptive compression scheme using experimental measurements in different scenarios and as a function of various parameters. …”
    Get full text
    Get full text
    Get full text
    article
  12. 32

    Gas pipeline modelling and control by Whalley, R

    Published 2015
    “…The pipeline input–output, transfer function, pressure and volume flow representations are formulated. …”
    Get full text
  13. 33

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…A fault tolerant network is able to function even in the presence of some faults in the network. …”
    Get full text
    article
  14. 34

    A novel network-based SIS framework for improved GA performance by Tohme, Rawane

    Published 2025
    “…To address these challenges, this work introduces SIS-NGA which integrates the Susceptible-Infected-Susceptible (SIS) epidemic model and Genetic Algorithms within a scale-free network topology, to guide the search for optimal solutions. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 35
  16. 36
  17. 37

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…We find these pointcuts and primitives to be necessary because they are needed to perform many security hardening practices and, to the best of our knowledge, none of the existing ones can provide their functionalities. Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  18. 38

    Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility by Islambouli, Rania

    Published 2019
    “…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 39

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…We find these pointcuts and primitives to be necessary because they are needed to perform many security hardening practices and, to the best of our knowledge, none of the existing ones can provide their functionalities. Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  20. 40

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article