Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
element » elements (Expand Search)
-
121
Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Alg...
Published 2023“…In this paper, the scheduling and management framework of an energy hub (EH) is presented with the aim of energy profit maximization in partnership with electricity, natural gas, and district heating networks (EGHNs) considering the coordinated multi-energy management based on the day-ahead market. The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
-
122
Fast Methods Fbr Split Codebooks
Published 2020“…The method is based on a family of fractals called Space-Filling Curves (SFC). …”
Get full text
article -
123
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
124
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
Published 2022“…The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
-
125
Nested ensemble selection: An effective hybrid feature selection method
Published 2023“…The proposed feature selection algorithm differs from the existing filter-wrapper hybrid methods in its simplicity and efficiency as well as precision. …”
Get full text
article -
126
Tensile Test Optimization Using the Design of Experiment and Soft Computing
Published 2023“…This study employs a hybrid soft computing approach, integrating an adaptive network-based fuzzy inference system (ANFIS), genetic algorithm (GA) optimization, and design of experiments (DOE). …”
-
127
Approximation algorithms inspired by kernelization nethods
Published 2017“…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of reduction rules and combinatorial insights. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
128
-
129
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
130
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The results also show that the Bee Colony algorithm outperforms other methods on most subject problems.…”
Get full text
Get full text
Get full text
article -
131
Scalable Parallel Algorithms for FPT Problems
Published 2006“…Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems of significance. …”
Get full text
Get full text
Get full text
article -
132
Improvement Algorithm for Limited Space Scheduling
Published 2001“…The model characterizes resource space requirements over time and establishes a time-space relationship for each activity in the schedule, based on alternative resource levels. An example illustrates the presented algorithm that generates a feasible space schedule.…”
Get full text
Get full text
article -
133
A new method of analysis for slender columns
Published 1991“…The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …”
Get full text
Get full text
article -
134
Data Redundancy Management in Connected Environments
Published 2020“…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
135
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. </p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …”
-
136
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
Get full text
-
137
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
Published 2024“…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
Get full text
article -
138
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…In this review paper, JAYA algorithm, which is a recent population-based algorithm is intensively overviewed. …”
Get full text
-
139
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
140
Parallel Algorithm for Hardware Implementation of Inverse Halftoning
Published 2005“…The algorithm is based on Lookup Tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
Get full text
article