Search alternatives:
maya algorithm » jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
421
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
-
422
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
423
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article -
424
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
425
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …”
-
426
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
427
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
Published 2013Get full text
Get full text
masterThesis -
428
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
429
Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics
Published 2020“…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …”
Get full text
article -
430
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
431
A Stochastic Newton-Raphson Method with Noisy Function Measurements
Published 2016“…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
432
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
Get full text
Get full text
article -
433
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
434
A method for data path synthesis using neural networks
Published 2017“…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
435
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
436
Shuffled Linear Regression with Erroneous Observations
Published 2019“…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
437
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text
-
438
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
439
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
440
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text