Search alternatives:
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
-
141
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
142
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text
-
143
An Adapted Load-Balancing implementation for Sharded Blockchains
Published 2024Get full text
Get full text
Get full text
masterThesis -
144
Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review
Published 2023“…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. …”
-
145
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. …”
Get full text
-
146
Second-order conic programming for data envelopment analysis models
Published 2022“…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
147
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. …”
-
148
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
149
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
150
Minimizing using BBO and DFO methods
Published 2022“…In order to apply this algorithm to real life problems, two numerical methods need to be developed: A numerical method to solve nonlinear differential equations, and a numerical method to nd the minimum of an objective function (given only numerically) in fi nite dimensional spaces. …”
Get full text
Get full text
Get full text
masterThesis -
151
Boosting the visibility of services in microservice architecture
Published 2023“…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
-
152
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
153
-
154
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
155
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
156
Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme
Published 2021“…System responses have been critically analyzed under Mine Blast Algorithm (MBA) based proportional–integral–derivative (PID) controllers</p><h2>Other Information</h2><p dir="ltr">Published in: Energy Reports<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2021.10.100" target="_blank">https://dx.doi.org/10.1016/j.egyr.2021.10.100</a></p>…”
-
157
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
158
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
-
159
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
Published 2024“…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
-
160
Android Malware Detection Using Machine Learning
Published 2024“…Malware, or malicious software, poses a significant threat to systems and networks. Malware attacks are becoming extremely sophisticated, and the ability to detect and prevent them is becoming more challenging. …”
Get full text
article