Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
system » systems (Expand Search)
Showing 181 - 200 results of 979 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( system modeling algorithm ))))', query time: 0.14s Refine Results
  1. 181
  2. 182

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System by Kouatli, Issam

    Published 2016
    “…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 183
  4. 184

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …”
  5. 185
  6. 186
  7. 187
  8. 188

    HVAC system attack detection dataset by Mariam Elnour (14147790)

    Published 2021
    “…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…”
  9. 189

    A hybrid model for the optimum integration of renewable technologies in power generation systems by Poullikkas, Andreas

    Published 2011
    “…The optimization model developed uses a genetic algorithm (GA) technique for the calculation of both the additional cost of electricity due to the penetration of RES-E technologies as well as the required RES-E levy in the electricity bills in order to fund this RES-E penetration. …”
    Get full text
    article
  10. 190

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  11. 191
  12. 192

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study by Mutasim Baba, Fuad

    Published 2022
    “…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
    Get full text
    Get full text
    Get full text
  13. 193

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …”
  14. 194
  15. 195
  16. 196
  17. 197
  18. 198
  19. 199
  20. 200