Showing 1 - 20 results of 84 for search '(( less based robust optimization algorithm ) OR ( binary based cell optimization algorithm ))', query time: 0.30s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    A* Path-Finding Algorithm to Determine Cell Connections by Max Weng (22327159)

    Published 2025
    “…Pixel paths were classified using a z-score brightness threshold of 1.21, optimized for noise reduction and accuracy. The A* algorithm then evaluated connectivity by minimizing Euclidean distance and heuristic cost between cells. …”
  11. 11

    Data Sheet 1_Robust multi-objective optimization framework for performance-based seismic design of steel frame with energy dissipation system.docx by Yuting Cheng (11954209)

    Published 2025
    “…This study introduces a novel Robust Multi-objective Optimization framework for Performance-Based Seismic Design (RMO-PBSD). …”
  12. 12
  13. 13
  14. 14
  15. 15

    Cuff-less Blood Pressure Measurement based on Four-wavelength PPG Signals by Liang yongbo (4822017)

    Published 2023
    “…<a href="https://www.mdpi.com/2079-6374/8/4/101" target="_blank"><b>Link</b></a></p><p dir="ltr">[12] Xuhao Dong Ziyi Wang, Liangli Cao, Zhencheng Chen*, <b>Yongbo Liang*</b>. Whale Optimization Algorithm with a Hybrid Relation Vector Machine: A Highly Robust Respiratory Rate Prediction Model Using Photoplethysmography Signals [J]. …”
  16. 16
  17. 17

    Table_1_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX by Maruf A. Tamal (18947776)

    Published 2024
    “…To bridge these gaps, this study aims to develop a more robust, effective, sophisticated, and reliable solution for phishing detection through the optimal feature vectorization algorithm (OFVA) and supervised machine learning (SML) classifiers.…”
  18. 18

    Table_2_Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning.DOCX by Maruf A. Tamal (18947776)

    Published 2024
    “…To bridge these gaps, this study aims to develop a more robust, effective, sophisticated, and reliable solution for phishing detection through the optimal feature vectorization algorithm (OFVA) and supervised machine learning (SML) classifiers.…”
  19. 19
  20. 20

    Block diagram of 2-DOF PIDA controller. by Erdal Eker (19251018)

    Published 2025
    “…A novel adaptive objective function (combining normalized overshoot, normalized settling time, and cumulative tracking error) guides the tuning process to achieve a balanced improvement in both transient and steady-state performance. The proposed GCRA-based 2-DOF PIDA controller is evaluated through extensive simulations and compared against state-of-the-art metaheuristic tuning approaches, including polar fox optimization (PFA), hiking optimization (HOA), success-history based adaptive differential evolution with linear population size reduction (L-SHADE), and particle swarm optimization (PSO), as well as several benchmark furnace control methods. …”