Search alternatives:
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
241
Reinforcement Learning-Based School Energy Management System
Published 2020“…In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …”
-
242
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
243
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
244
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…First, the OSF is detected and localized based on the grid current dynamics, where each switch fault generates a specific pattern in the current dynamics. OSF is tolerated by changing the switching function based on the location of the fault. …”
-
245
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The fuel cell gives nonlinear voltage versus current characteristics. As a result, the extraction of maximum power from the fuel stack is very difficult. …”
-
246
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The fuel cell gives nonlinear voltage versus current characteristics. As a result, the extraction of maximum power from the fuel stack is very difficult. …”
Get full text
Get full text
Get full text
article -
247
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
248
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…Starting from a small set of candidate solutions, our algorithm efficiently explores the search space and returns 3D protein structures with minimal energy. …”
Get full text
Get full text
Get full text
article -
249
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study considers determining the optimal size of a homogeneous fleet of trucks to be outsourced (or subcontracted) from a third-party logistics provider to be used daily to cyclically transport different types of raw materials from designated storage yards to intermediate buffer locations to be fed as inputs to a production facility for processing. …”
-
250
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
Published 2023“…Besides, in literature, we barely can find a resummation algorithm for which the convergence is faster for stronglydivergent ( Gevrey − k , k > 1) series than a divergent one ( Gevrey − 1 ). …”
-
251
-
252
Defense against adversarial attacks: robust and efficient compressed optimized neural networks
Published 2024“…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …”
-
253
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
254
Power matching approach for GPS coverage extension
Published 2006“…The inherent problem of the Global Positioning System (GPS), which is signal obstruction, remains the major obstacle that inhibits it from functioning as a "reliable stand-alone" positioning system. …”
Get full text
Get full text
Get full text
Get full text
article -
255
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
256
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
Get full text
Get full text
article -
257
Modeling of magnetization curves for computer-aided design
Published 1993“…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …”
Get full text
Get full text
article -
258
GENETIC SCHEDULING OF TASK GRAPHS
Published 2020“…A genetic algorithm for scheduling computational task graphs is presented. …”
Get full text
article -
259
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
260
Multidimensional Gains for Stochastic Approximation
Published 2019“…This paper deals with iterative Jacobian-based recursion technique for the root-finding problem of the vector-valued function, whose evaluations are contaminated by noise. …”
Get full text
Get full text
Get full text
Get full text
article