Search alternatives:
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search)
both function » cost function (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search)
both function » cost function (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
121
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. …”
Get full text
article -
122
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
Get full text
article -
123
Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning
Published 2003“…A series of experiments are performed to evaluate the efficiency of the algorithm. …”
Get full text
Get full text
article -
124
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
Get full text
Get full text
Get full text
article -
125
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …”
-
126
An incremental approach for test scheduling and synthesis using genetic algorithms
Published 2017“…The method is based on a genetic algorithm that efficiently explores the testable design space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
127
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
Published 2007“…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
Get full text
Get full text
Get full text
article -
128
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
Get full text
Get full text
Get full text
conferenceObject -
129
Online dynamic ensemble deep random vector functional link neural network for forecasting
Published 2023“…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). …”
-
130
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
-
131
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
Published 2012Get full text
Get full text
masterThesis -
132
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
133
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
Get full text
Get full text
Get full text
masterThesis -
134
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”
-
135
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
-
136
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…In addition, whether these algorithms have a search bias to the origin (i.e., the center of the search space) is investigated. …”
-
137
-
138
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …”
Get full text
Get full text
article -
139
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
Published 2004“…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
Get full text
article -
140
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text