Showing 21 - 40 results of 67 for search '(( algorithm fa function ) OR ( algorithm ((heat function) OR (most function)) ))', query time: 0.11s Refine Results
  1. 21

    Optimized Load-Scheduling Algorithm for CubeSat's Electric Power System Management Considering Communication Link by Bayan Hussein (16904856)

    Published 2023
    “…An optimization problem is formulated with data rate and BER in the cost function while maintaining energy and power constraints. …”
  2. 22
  3. 23

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet by Imran Siddique (12705185)

    Published 2024
    “…Also, the comparison of A⁢l<sub>2</sub>⁢O<sub>3</sub>/SA, Cu/SA and A⁢l<sub>2⁢</sub>O<sub>3</sub> +Cu/SA through the fuzzy membership functions (MFs). The fuzzy MFs show that the hybrid nanofluid (A⁢l<sub>2</sub>⁢O<sub>3</sub> +Cu/SA) in terms of rate of heat transfer is better than both Cu/SA and A⁢l<sub>2⁢</sub>O<sub>3</sub>/SA nanofluids.…”
  4. 24

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  5. 25

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
    Get full text
  6. 26

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. …”
  7. 27

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  8. 28

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems by Agushaka, Jeffrey O.

    Published 2022
    “…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. In most cases, the results show that solutions achieved by the IDMO are better than those obtained by the existing algorithms.…”
    Get full text
  9. 29
  10. 30

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
  11. 31
  12. 32

    A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation by Iman M. Hosseini Naveh (16891482)

    Published 2021
    “…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …”
  13. 33

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  14. 34

    Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures by Iryna Haponchyk (19691701)

    Published 2017
    “…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …”
  15. 35
  16. 36
  17. 37

    A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System by Ekinci, Serdar

    Published 2023
    “…We show the CmOBL-AO algorithm to perform better than the differential evolution algorithm, gravitational search algorithm, African vultures optimization, and the Aquila Optimizer using well-known unimodal, multimodal benchmark functions. …”
    Get full text
  18. 38

    Contingency analysis of bulk power system using neural networks by Maghrabi, H.

    Published 1998
    “…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. …”
    Get full text
    Get full text
    article
  19. 39
  20. 40