Showing 141 - 160 results of 348 for search '(( ((algorithm a) OR (algorithm fa)) functional ) OR ( algorithm python function ))*', query time: 0.09s Refine Results
  1. 141

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  2. 142

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
    Get full text
  3. 143
  4. 144

    Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review by Tareq Foqha (17947778)

    Published 2023
    “…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. …”
  5. 145

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems by Agushaka, Jeffrey O.

    Published 2022
    “…This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. …”
    Get full text
  6. 146

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
    Get full text
    Get full text
  7. 147

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm by Abdelbasset Krama (16870008)

    Published 2018
    “…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. …”
  8. 148
  9. 149
  10. 150

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…In order to apply this algorithm to real life problems, two numerical methods need to be developed: A numerical method to solve nonlinear differential equations, and a numerical method to nd the minimum of an objective function (given only numerically) in fi nite dimensional spaces. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 151

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
  12. 152

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
  13. 153
  14. 154
  15. 155
  16. 156

    Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme by Sudhanshu Ranjan (17151115)

    Published 2021
    “…System responses have been critically analyzed under Mine Blast Algorithm (MBA) based proportional–integral–derivative (PID) controllers</p><h2>Other Information</h2><p dir="ltr">Published in: Energy Reports<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2021.10.100" target="_blank">https://dx.doi.org/10.1016/j.egyr.2021.10.100</a></p>…”
  17. 157

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  18. 158

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
  19. 159

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation by Raveendra Pilli (21633287)

    Published 2024
    “…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
  20. 160

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Malware, or malicious software, poses a significant threat to systems and networks. Malware attacks are becoming extremely sophisticated, and the ability to detect and prevent them is becoming more challenging. …”
    Get full text
    article