Showing 41 - 60 results of 123 for search '(((( algorithm phase function ) OR ( algorithm its function ))) OR ( algorithms within function ))', query time: 0.13s Refine Results
  1. 41
  2. 42
  3. 43

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  4. 44

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…The overlay structure – a unique logical tree – used to control access to the critical section maintains its consistency even when nodes fail. An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …”
  5. 45
  6. 46
  7. 47

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…In the initial phase, the proposed HNIDS utilizes hybrid EGA-PSO methods to enhance the minor data samples and thus produce a balanced data set to learn the sample attributes of small samples more accurately. …”
  8. 48

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
  9. 49

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation by Said Mahfoud (17150968)

    Published 2022
    “…The best solutions adopted in this situation are often based on optimization algorithms that generate the controller’s gains in each period where there is an internal or external perturbation, adapting the behaviors of the PID against the system’s nonlinearity. …”
  10. 50

    A simplified sliding‐mode control method for multi‐level transformerless DVR by Hasan Komurcugil (16388513)

    Published 2022
    “…Second, an effective method based on charging/discharging conditions of DC capacitors is proposed for balancing capacitor voltages using relevant switching state rather than combining DC voltage error with the inductor current error through a suitable weighting factor in forming the cost function. Therefore, the weighting factor necessity in the control algorithm is eliminated. …”
  11. 51
  12. 52

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
    Get full text
    Get full text
  13. 53
  14. 54

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…Service Oriented Architecture (SOA) surpassed monolithic architecture due to its reusability, platform independency, ease of maintenance, and scalability. …”
  15. 55

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
    Get full text
  16. 56
  17. 57

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  18. 58
  19. 59

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…It is shown that improving the fault tolerance of a network can be achieved while optimizing its reliability however at the expense of a reasonable increase in the overall cost of the network while remaining within a maximum pre-specified cost constraint.…”
    Get full text
    article
  20. 60

    Fragment based protein structure prediction. (c2013) by Terzian, Meghrig Ohanes

    Published 2016
    “…The method is based on a two-phase Scatter Search metaheuristic that minimizes the energy function. …”
    Get full text
    Get full text
    masterThesis