بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
81
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
منشور في 2022"…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …"
-
82
-
83
-
84
-
85
-
86
Parallel processing
منشور في 2005احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
87
L-2 Gap-Metric-Based Identification Algorithms For Linear Feedback Systems
منشور في 2020"…In this paper, we propose two algorithms to identify linear feedback systems. The parameters of the model are obtained to minimize the L-2-gap between the observed true system and the identified model. …"
احصل على النص الكامل
article -
88
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
89
Optimal Sizing and Techno-Economic Analysis of Hybrid Renewable Energy Systems—A Case Study of a Photovoltaic/Wind/Battery/Diesel System in Fanisau, Northern Nigeria
منشور في 2020الموضوعات: "…hybrid renewable energy systems…"
-
90
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
-
91
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …"
احصل على النص الكامل
article -
92
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
منشور في 2020"…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …"
احصل على النص الكامل
article -
93
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
منشور في 2019"…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …"
احصل على النص الكامل
article -
94
-
95
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …"
-
96
A fast exact sequential algorithm for the partial digest problem
منشور في 2016"…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
-
97
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
منشور في 2022"…The forecasting performance of the proposed model is compared with other population-based optimized IT2-FLS including genetic algorithm and artificial bee colony optimization algorithm. …"
-
98
-
99
Modelling And Analysis Of A Multi-Stage Order Quantity Model
منشور في 2020احصل على النص الكامل
article -
100
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …"
احصل على النص الكامل
masterThesis