Search alternatives:
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
301
-
302
Online Control and Optimization of Directional Drilling
Published 2020“…Secondly, the autonomous quad-rotor DSS which has 4 downhole motors, is considered. In this work, a novel feedback linearization controller to cancel the nonlinear dynamics of a DSS is proposed. …”
Get full text
masterThesis -
303
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
304
Scatter search for homology modeling
Published 2016“…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
305
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
306
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
307
Regression testing web services-based applications
Published 2006“…Our algorithm selects every test sequence that corresponds to a different behavior in the modified system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
308
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article -
309
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
Get full text
Get full text
Get full text
article -
310
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
Published 2023“…Besides, in literature, we barely can find a resummation algorithm for which the convergence is faster for stronglydivergent ( Gevrey − k , k > 1) series than a divergent one ( Gevrey − 1 ). …”
-
311
-
312
Power matching approach for GPS coverage extension
Published 2006“…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
313
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
Get full text
Get full text
article -
314
FoGMatch
Published 2019“…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
315
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
316
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
317
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
Published 2006“…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
Get full text
article -
318
-
319
Design of adaptive arrays based on element position perturbations
Published 1993“…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
Get full text
Get full text
article -
320
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject