Search alternatives:
deep clustering » data clustering (Expand Search)
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
system » systems (Expand Search)
deep clustering » data clustering (Expand Search)
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
system » systems (Expand Search)
-
1
Fault detection and classification in hybrid energy-based multi-area grid-connected microgrid clusters using discrete wavelet transform with deep neural networks
Published 2024“…Due to their reliance on sizable fault currents, classic fault detection techniques are no longer suitable for microgrids that employ inverter-interfaced distributed generation. Nowadays, deep learning algorithms are essential for ensuring the reliable, safe, and efficient operation of these complex energy systems. …”
-
2
-
3
Control of nonlinear dynamical systems using genetic algorithms
Published 1997“…This paper introduces a new method for the control of nonlinear systems using genetic algorithms. The proposed method formulates the nonlinear controller design as an optimization problem and genetic algorithms are used in the optimization process. …”
Get full text
Get full text
article -
4
-
5
A Survey of Data Clustering Techniques
Published 2023“…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
Get full text
Get full text
Get full text
masterThesis -
6
-
7
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
-
9
-
10
Holistic Design: Optimizing Mechatronic Systems Using Multi Objective Optimization
Published 2015Get full text
doctoralThesis -
11
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…Optimal multiobjective design of robust multimachine power system stabilizers (PSSs) using genetic algorithms is presented in this paper. …”
Get full text
Get full text
article -
12
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…Network integration is common in cyber-physical systems (CPS) to allow for remote access, surveillance, and analysis. …”
Get full text
Get full text
-
13
Power-constrained system-on-a-chip test scheduling using a genetic algorithm
Published 2006“…This paper presents an efficient approach for the test scheduling problem of core-based systems based on a genetic algorithm. The method minimizes the overall test application time of a system-on-a-chip through efficient and compact test schedules. …”
Get full text
Get full text
Get full text
article -
14
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…On the other hand, keystroke dynamics-based systems achieve very high accuracy but have low anti-spoofing capability. …”
-
15
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
16
-
17
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …”
Get full text
Get full text
Get full text
masterThesis -
18
-
19
-
20