-
1
Valuation of commodity option prices under a regime-switching model with stochastic convenience yield: Model calibration using flower pollination optimization algorithm
Published 2025“…We calibrate the option pricing model parameters using the flower pollination optimization algorithm based on the European call option prices in WTI crude oil market. …”
-
2
-
3
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
Get full text
Get full text
Get full text
article -
4
-
5
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…We developed and tested a heart rate-based algorithm that captures inter- and intra-individual sleep differences in free-living conditions and does not require human input. …”
-
6
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
-
7
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…Next, as a feature selection tool, an improved extension of Artificial Butterfly Optimization (ABO) algorithm is used in order to extract the significant features from data and improve the diagnosis results of multiscale interval SVM. …”
-
8
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …”
-
9
Teaching–learning-based optimization algorithm: analysis study and its application
Published 2024Subjects: “…Teaching–learning-based optimization algorithm…”
Get full text
-
10
Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine
Published 2024“…In this MOD-POA+ELM algorithm, the modified pelican optimization algorithm (MOD-POA) has been utilized to optimize the parameters of ELM’s hidden neurons. …”
-
11
Effective uncertain fault diagnosis technique for wind conversion systems using improved ensemble learning algorithm
Published 2023“…<p>This paper introduces a pioneering fault diagnosis technique termed Interval Ensemble Learning based on Sine Cosine Optimization Algorithm (IEL- SCOA), tailored to tackle uncertainties prevalent in wind energy conversion (WEC) systems. …”
-
12
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
13
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
Get full text
-
14
-
15
-
16
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: Get full text
Get full text
-
17
-
18
-
19
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
Published 2023“…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
Get full text
-
20