Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
201
Process Targeting Of Multi-Characteristic Product Using Fuzzy Logic And Genetic Algorithm With An Interval Based Taguchi Cost Function
Published 2020“…In this paper, a fuzzy based process targeting model is developed for a product with multi-characteristic. …”
Get full text
article -
202
High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm
Published 2025“…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
-
203
A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading
Published 2020“…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
-
204
-
205
Fuzzy genetic algorithm for floorplanning
Published 2020“…In the proposed FGA, the fitness of individuals is evaluated based on fuzzy logic rules expressed on linguistic variables modeling the desired objective criteria of the problem domain. …”
Get full text
article -
206
Novel RFID-Based Pose Estimation Using Single Stationary Antenna
Published 2016“…Our scheme is based on power map matching algorithm that is capable in estimating the location and orientation of objects. …”
Get full text
Get full text
Get full text
Get full text
article -
207
-
208
-
209
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
Published 2024Get full text
doctoralThesis -
210
-
211
Identification of physically based models of residential air-conditioners for direct load control management
Published 2004“…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
Get full text
Get full text
article -
212
-
213
BUC algorithm for iceberg cubes
Published 2003“…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
214
Fragment based protein structure prediction. (c2013)
Published 2016“…In addition, it demonstrates the advantage of using the CHARMM36 energy model. The method is based on a two-phase Scatter Search metaheuristic that minimizes the energy function. …”
Get full text
Get full text
masterThesis -
215
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
216
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
217
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
Get full text
-
218
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …”
-
219
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
220