Search alternatives:
experiments each » experiments approach (Expand Search)
using algorithm » cosine algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
experiments each » experiments approach (Expand Search)
using algorithm » cosine algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
61
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
Published 2006“…An artificial neural network (ANN) for online tuning of a genetic algorithm based PI controller for interior permanent magnet synchronous motor (IPMSM) drive is presented in this paper. …”
Get full text
article -
62
-
63
Optimum Partition of Power Networks Using Singular Value Decomposition and Affinity Propagation
Published 2024“…The adopted methodology aims to enhance partitioning efficiency substantially while preserving a high level of partitioning quality. The proposed framework is verified on IEEE 14, 39, 118, and 2000-bus systems and compared to nine other well-known and widely used clustering techniques, including K-Means and Gaussian Mixture models. …”
-
64
-
65
Implementation of trust region methods in optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
66
Boosting the visibility of services in microservice architecture
Published 2023“…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
67
Improvement Algorithm for Limited Space Scheduling
Published 2001“…The model characterizes resource space requirements over time and establishes a time-space relationship for each activity in the schedule, based on alternative resource levels. An example illustrates the presented algorithm that generates a feasible space schedule.…”
Get full text
Get full text
article -
68
Scalable Parallel Algorithms for FPT Problems
Published 2006“…To accomplish this, an efficient sequential algorithm and various forms of parallel algorithms are devised, implemented, and compared. …”
Get full text
Get full text
Get full text
article -
69
-
70
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
71
Predicting Plasma Vitamin C Using Machine Learning
Published 2022“…<p dir="ltr">Precision Nutrition makes use of personal information about individuals to produce nutritional recommendations that have more utility than general population level recommendations. …”
-
72
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
Published 2017Get full text
doctoralThesis -
73
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
74
Artificial neural network algorithms. (c1999)
Published 1999Get full text
Get full text
masterThesis -
75
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
76
Particle swarm optimization algorithm: review and applications
Published 2024“…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
Get full text
-
77
Empirical comparison of regression test selection algorithms
Published 2001“…These criteria are: number of selected test cases, execution time, precision, inclusiveness, preprocessing requirements, type of maintenance, level of testing, and type of approach. The empirical results show that the five algorithms can be used for different requirements of regression testing. …”
Get full text
Get full text
Get full text
article -
78
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
Get full text
Get full text
article -
79
-
80
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text