Search alternatives:
auction algorithm » detection algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
auction algorithm » detection algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
-
41
Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing
Published 2024“…Moreover, the incorporation of Levy flights injects stochasticity into the search process, enabling the algorithm to escape local optima and navigate complex solution spaces more effectively. …”
Get full text
-
42
-
43
-
44
-
45
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …”
Get full text
-
46
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…In underwater wireless sensor network, many sensor nodes are distributed at different depths in the sea. Due to its complex nature, updating their location or adding new devices is pretty challenging. …”
-
47
Predicting stability of classes in an object-oriented system
Published 2010“…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…”
Get full text
Get full text
Get full text
article -
48
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
Get full text
Get full text
Get full text
masterThesis -
49
Robust tuning of power system stabilizers in multimachine powersystems
Published 2000“…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. The objective function allows the selection of the stabilizer parameters to optimally place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane. …”
Get full text
Get full text
article -
50
Reinforcement Learning-Based School Energy Management System
Published 2020“…Conventional Building Energy Management methods suffer from a high dimensional and complex control environment. In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …”
-
51
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
52
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
Get full text
masterThesis -
53
-
54
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
55
Power system output feedback stabilizer design via geneticalgorithms
Published 1997“…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
Get full text
Get full text
article -
56
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
Published 2023“…The complex gas hydrate prevention unit is simulated using the MLPNN model trained by 20 different optimization algorithms. …”
-
57
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
-
58
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…<p dir="ltr">In this paper, we investigate the performance of multiple-input and multiple-output (MIMO) unmanned air vehicle (UAV) based multi-user communication systems over generalized Nakagami- m fading channels subject to channel feedback delays. …”
-
59
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
Published 2025Get full text
doctoralThesis -
60
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis