بدائل البحث:
algorithm used » algorithm sma (توسيع البحث), algorithm survey (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm fa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث), algorithms _ (توسيع البحث)
algorithm used » algorithm sma (توسيع البحث), algorithm survey (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm fa » algorithm _ (توسيع البحث), algorithms a (توسيع البحث), algorithms _ (توسيع البحث)
-
221
Scatter search for homology modeling
منشور في 2016"…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
222
The maximum common subgraph problem
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
223
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
224
Phased Array Technique for Brain Source Localization
منشور في 2012احصل على النص الكامل
doctoralThesis -
225
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
منشور في 2019"…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
226
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
منشور في 2011"…We evaluate and optimize the performance of the proposed adaptive compression scheme using experimental measurements in different scenarios and as a function of various parameters. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
227
Particle swarm optimization approach for protein structure prediction in the 3D HP model
منشور في 2012"…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
228
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
منشور في 2023"…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
229
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
منشور في 2023"…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …"
-
230
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
منشور في 2023"…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …"
-
231
-
232
-
233
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
منشور في 2024"…This work centers on developing an intelligent hybrid system combining communication lines using millimeter wave (mmWave) and Visible light communication (VLC). …"
-
234
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
منشور في 2024"…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. …"
-
235
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
منشور في 2019"…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …"
-
236
Design of adaptive arrays based on element position perturbations
منشور في 1993"…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
237
Regression testing web services-based applications
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
238
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
239
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
منشور في 2022"…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …"
-
240
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject