Search alternatives:
algorithm most » algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
its function » cost function (Expand Search)
algorithm most » algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
most function » cost function (Expand Search), taste function (Expand Search)
its function » cost function (Expand Search)
-
81
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…A fault tolerant network is able to function even in the presence of some faults in the network. …”
Get full text
article -
82
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
83
-
84
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
85
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article -
86
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…The performance of our approach is gauged against the traditional multi-label Naïve Bayes (MLNB) algorithm and is quantified through a suite of evaluation metrics. …”
-
87
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
-
88
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
89
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…Proteins fold, under the influence of several chemical and physical factors, into their 3D structures, which determine their biological functions and properties. Misfolding occurs when the protein folds into a 3D structure that does not represent its native structure, which can lead to diseases. …”
Get full text
Get full text
Get full text
article -
90
Regression testing web services-based applications
Published 2006“…Our algorithm selects every test sequence that corresponds to a different behavior in the modified system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
91
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
92
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …”
-
93
Power matching approach for GPS coverage extension
Published 2006“…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. Most DR systems, which compensate for GPS inaccuracies and frequent GPS signal obstructions, employ an odometer and a directional sensor. …”
Get full text
Get full text
Get full text
Get full text
article -
94
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…BackgroundExtremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown. …”
Get full text
Get full text
Get full text
article -
95
Platoon Transitional Maneuver Control System: A Review
Published 2021“…The most recent articles on platoon control maneuvers have been analyzed based on the proposed control algorithm, homogeneously or heterogeneously of platoon members, type of platoon maneuver, the aim of control problem, type of implementation, and used simulation tools. …”
-
96
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…Building on this foundation, the second algorithm extends this analytical approach to support high-dimensional input data, substantially enhancing its utility across complex real-world datasets. …”
-
97
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
98
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article -
99
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…<h3>Background</h3><p dir="ltr">Extremity ischemia and necrosis after jellyfish envenomation can be mutilating and cause long-term functional deficits. The best way to manage these presentations is unknown.…”
-
100
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject