Search alternatives:
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
a function » _ functional (Expand Search)
-
261
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
262
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
263
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
264
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article -
265
Power system output feedback stabilizer design via geneticalgorithms
Published 1997“…In the second method, the problem of selecting the output feedback gains is converted to a simple optimization problem with an eigenvalue based objective function, which is solved by a genetic algorithm. …”
Get full text
Get full text
article -
266
FoGMatch
Published 2019“…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
267
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
Get full text
Get full text
article -
268
Regression testing web services-based applications
Published 2006“…Our algorithm selects every test sequence that corresponds to a different behavior in the modified system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
269
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …”
-
270
Iterative heuristics for multiobjective VLSI standard cellplacement
Published 2001“…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …”
Get full text
Get full text
article -
271
EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING
Published 2020“…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…”
Get full text
article -
272
General iterative heuristics for VLSI multiobjective partitioning
Published 2003“…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
Get full text
Get full text
article -
273
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
274
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis -
275
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
276
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
277
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
278
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
279
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
280
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
Published 2022“…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”