Search alternatives:
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element per » elementi per (Expand Search)
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element per » elementi per (Expand Search)
-
201
-
202
-
203
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
Published 2019“…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
Get full text
Get full text
Get full text
Get full text
article -
204
Development of multivariable PID controller gains in presence of measurement noise
Published 2017“…The development of the proposed optimal algorithm is based on minimising a stochastic performance index in presence of erroneous initial conditions, white measurement noise, and white process noise. …”
Get full text
Get full text
Get full text
Get full text
article -
205
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
Get full text
article -
206
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…These results outperform the individual modalities with a significant margin (~5%). We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …”
-
207
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
-
208
-
209
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …”
-
210
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
-
211
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
212
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
213
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
214
Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance
Published 2025“…This study focuses on developing an advanced control strategy for a Brushless Dual-Fed Induction Generator (BDFIG) integrated with a Nonlinear Energy Storage System. …”
-
215
Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem
Published 2024“…Further, the developed methods are practical in that they allow the specialist to adjust the tradeoff between the exactness and speed of attaining a solution. …”
-
216
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
Published 2020“…However, the large computational burden required by the SHM method to find a solution confines it as an off-line application, where the switching set valid solutions are pre-computed and stored in a memory. …”
-
217
Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation
Published 2021“…A feedback controller with a collocated sensor-actuator configuration is used. …”
-
218
-
219
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
220
EEG Signal Processing for Medical Diagnosis, Healthcare, and Monitoring: A Comprehensive Review
Published 2023“…The study of reliable feature extraction and classification algorithms is crucial for a more accurate analysis of EEG signals. …”