Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
regulating » regulations (Expand Search), regulation (Expand Search)
system » systems (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
regulating » regulations (Expand Search), regulation (Expand Search)
system » systems (Expand Search)
element » elements (Expand Search)
-
81
-
82
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…This is addressed such that the genetic algorithm (GA) technique is used for selecting the best features and the artificial neural network (ANN) classifier is applied for fault diagnosis. …”
-
83
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
Published 2021“…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. …”
-
84
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …”
-
85
-
86
Scatter search algorithm for the cross-dock door assignment problem
Published 2014Get full text
Get full text
Get full text
Get full text
conferenceObject -
87
A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System
Published 2021“…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …”
-
88
-
89
-
90
Malicious URL and Intrusion Detection using Machine Learning
Published 2024“…Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …”
Get full text
article -
91
-
92
Modeling and Control of Nonlinear Systems Using Wavelet Networks
Published 2006Get full text
doctoralThesis -
93
-
94
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …”
-
95
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…We research and test the design of the right neural networks that achieves our goal. A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …”
Get full text
Get full text
-
96
-
97
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact laser transduction system
Published 2020“…The focus of this study is on locating surface and sub-surface defects that occur in rail tracks using Rayleigh waves that were emitted and sensed by a fully non-contact laser transduction system. …”
Get full text
-
98
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
Published 2005“…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …”
Get full text
Get full text
article -
99
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …”
-
100