Search alternatives:
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
-
101
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
102
A new multimodulus blind equalization algorithm
Published 2004“…The proposed algorithm is obtained by removing the discontinuity found in the RCA cost function. …”
Get full text
Get full text
article -
103
A fuzzy basis function network for generator excitation control
Published 1997“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
Get full text
Get full text
article -
104
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
Published 2024“…Next, principal component analysis (PCA) is used to select the best subset of attributes. After that, the optimized features are fed into single machine learning and stacking-based ensemble classifiers. …”
-
105
A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation
Published 2021“…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …”
-
106
A new reactive power optimization algorithm
Published 2003“…This paper presents an algorithm for optimizing reactive power using particle swarm algorithm. …”
Get full text
Get full text
article -
107
-
108
A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs
Published 2024“…Fortunately, the availability of modern computing devices has made the automated diagnosis of teeth readily possible using deep learning. Despite this, concerns about the accuracy and function of automated diagnosis remain among patients. …”
Get full text
article -
109
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…We formulate the testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
Get full text
Get full text
Get full text
Get full text
article -
110
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
111
Finite state machine state assignment for area and power minimization
Published 2006Get full text
Get full text
article -
112
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
113
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
114
Belief selection in point-based planning algorithms for POMDPs
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
115
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
116
Simultaneous stabilization of multimachine power systems viagenetic algorithms
Published 1999“…This paper demonstrates the use of genetic algorithms for the simultaneous stabilization of multimachine power systems over a wide range of operating conditions via single-setting power system stabilizers. …”
Get full text
Get full text
article -
117
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. …”
Get full text
Get full text
Get full text
article -
118
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
119
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
120
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”