Showing 1 - 20 results of 46 for search '(( code genetic algorithm ) OR ( wide detection algorithm ))', query time: 0.10s Refine Results
  1. 1

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
    Get full text
    Get full text
    article
  2. 2

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
    Get full text
    Get full text
    article
  3. 3

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  4. 4
  5. 5
  6. 6

    Design of PSS and STATCOM-based damping stabilizers using genetic algorithms by Abido, M.A.

    Published 2006
    “…The design problem of STATCOM-based stabilizers is formulated as an optimization problem. Then, a real-coded genetic algorithm (RCGA) is employed to search for optimal stabilizer parameters. …”
    Get full text
    Get full text
    article
  7. 7

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem by Mantawy, A.H.

    Published 1999
    “…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …”
    Get full text
    Get full text
    article
  8. 8

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem by Mantawy, A. H.

    Published 2020
    “…In the proposed algorithm, genetic algorithm solution is coded as a mix between binary and decimal representation. …”
    Get full text
    article
  9. 9

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms by Abdel-Magid, Y. L.

    Published 2004
    “…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …”
    Get full text
    article
  10. 10

    Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem by Montawy, A.H.

    Published 2020
    “…A new implementation of the genetic algorithm is introduced. The genetic algorithm solution is coded as a mix between binary and decimal representation. …”
    Get full text
    article
  11. 11

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  12. 12

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
  13. 13
  14. 14
  15. 15

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 16
  17. 17

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…”
    Get full text
  18. 18

    Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability by Farah R. Zahir (18892108)

    Published 2017
    “…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
  19. 19

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  20. 20

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text