Search alternatives:
processing algorithm » processing algorithms (Expand Search)
time processing » image processing (Expand Search), text processing (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ppo algorithm » rd algorithm (Expand Search)
elements ppo » elements _ (Expand Search), elementi per (Expand Search)
level using » level fusion (Expand Search)
processing algorithm » processing algorithms (Expand Search)
time processing » image processing (Expand Search), text processing (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ppo algorithm » rd algorithm (Expand Search)
elements ppo » elements _ (Expand Search), elementi per (Expand Search)
level using » level fusion (Expand Search)
-
141
Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer
Published 2023“…The operating cost of a residential building is reduced by using a day-ahead scheduling process for controlling multiple energy sources to create a reliable look-up table that estimates the best schedule for the distributed energy sources at each time frame. …”
Get full text
Get full text
Get full text
article -
142
Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer
Published 2023“…The operating cost of a residential building is reduced by using a day-ahead scheduling process for controlling multiple energy sources to create a reliable look-up table that estimates the best schedule for the distributed energy sources at each time frame. …”
-
143
-
144
Virtual topologies for massively parallel computations. (c2015)
Published 2015“…Massively parallel computations that are based on such algorithms often suffer from a large communication overhead due to the exponential growth in the number of tasks generated at each search-tree level. …”
Get full text
Get full text
masterThesis -
145
A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm
Published 2023“…In this study, features were extracted from signals in time, frequency, and time–frequency domains. The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
-
146
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
147
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
148
-
149
Simultaneous stabilisation of power systems using geneticalgorithms
Published 1997“…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
Get full text
Get full text
article -
150
On-site workshop investment problem: A novel mathematical approach and solution procedure
Published 2023“…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …”
-
151
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…Analysis of the algorithm performance showed promising results and indicated improvement of the recommendations over time.…”
Get full text
Get full text
-
152
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
Get full text
article -
153
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
154
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The performed experiments show that 60% of flow packets are a good compromise that ensures high performance in the least processing time. The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
Get full text
article -
155
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
156
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
157
-
158
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. …”
-
159
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
Published 2020“…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
-
160