Search alternatives:
heat function » heart function (Expand Search), cost function (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
heat function » heart function (Expand Search), cost function (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
-
21
Optimized Load-Scheduling Algorithm for CubeSat's Electric Power System Management Considering Communication Link
Published 2023“…An optimization problem is formulated with data rate and BER in the cost function while maintaining energy and power constraints. …”
-
22
-
23
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
Published 2024“…Also, the comparison of Al<sub>2</sub>O<sub>3</sub>/SA, Cu/SA and Al<sub>2</sub>O<sub>3</sub> +Cu/SA through the fuzzy membership functions (MFs). The fuzzy MFs show that the hybrid nanofluid (Al<sub>2</sub>O<sub>3</sub> +Cu/SA) in terms of rate of heat transfer is better than both Cu/SA and Al<sub>2</sub>O<sub>3</sub>/SA nanofluids.…”
-
24
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
25
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …”
Get full text
-
26
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. …”
-
27
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
-
28
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. In most cases, the results show that solutions achieved by the IDMO are better than those obtained by the existing algorithms.…”
Get full text
-
29
-
30
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
-
31
-
32
A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation
Published 2021“…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …”
-
33
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
34
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
Published 2017“…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …”
-
35
-
36
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
37
A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System
Published 2023“…We show the CmOBL-AO algorithm to perform better than the differential evolution algorithm, gravitational search algorithm, African vultures optimization, and the Aquila Optimizer using well-known unimodal, multimodal benchmark functions. …”
Get full text
-
38
Contingency analysis of bulk power system using neural networks
Published 1998“…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. …”
Get full text
Get full text
article -
39
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
40
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis