Showing 1 - 7 results of 7 for search 'linear due process optimization algorithm', query time: 0.06s Refine Results
  1. 1

    Optimizing Aircraft Pitch Control Systems: A Novel Approach Integrating Artificial Rabbits Optimizer with PID-F Controller by Abualigah, Laith

    Published 2024
    “…Traditional control strategies face challenges due to the non-linear and uncertain dynamics of flight. …”
    Get full text
  2. 2
  3. 3

    EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach by Muhammad Adeel Asghar (6724982)

    Published 2019
    “…Recognizing emotions is a challenging task due to the non-linear property of the EEG signal. …”
  4. 4

    On-site workshop investment problem: A novel mathematical approach and solution procedure by Nima Moradi (19418821)

    Published 2023
    “…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …”
  5. 5

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…System delays are obtained by approximating the model by a linear model. Genetic algorithm, which is a heuristic optimization technique, is used to ¯nd the system delays of the linear model, which are used in dynamical neural network model. …”
    Get full text
    masterThesis
  6. 6

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 7

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”