Search alternatives:
application algorithm » pollination algorithm (Expand Search), optimization algorithm (Expand Search), auction algorithm (Expand Search)
optimizations » optimization (Expand Search), optimisation (Expand Search)
application algorithm » pollination algorithm (Expand Search), optimization algorithm (Expand Search), auction algorithm (Expand Search)
optimizations » optimization (Expand Search), optimisation (Expand Search)
-
201
Design and development of an embedded controller for roboticmanipulator
Published 1998Get full text
Get full text
article -
202
A matheuristic approach for solving the 2-connected dominating set problem
Published 2019“…The goal of the proposed method is to find near optimal solutions for large graphs. The algorithm is based on a Greedy Randomized Adaptive Search Procedure (GRASP). …”
-
203
A MIMO Sampling-Rate-Dependent Controller
Published 2014“…Performance is compared to a PID controller with fuzzy gain scheduling, four multivariable PID controllers, an H ∞ optimal controller, and an iterative-learning-control algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
204
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing
Published 2019“…It provides advanced manageability strategies, formulated in an optimization model, which appropriately turn off applications and switch off virtual environments to release device resources when needed. …”
Get full text
Get full text
Get full text
Get full text
article -
205
Development and Implementation of a Hybrid Intelligent Controller for Interior Permanent Magnet Synchronous Motor Drives
Published 2004“…At each operating condition a genetic algorithm is used to optimize the PI controller parameters in a closed-loop vector control scheme. …”
Get full text
article -
206
The maximum common subgraph problem
Published 2017“…Many algorithms exist that can deliver optimal MCS solutions, but whose asymptotic worst-case run times fail to do better than mere brute-force, which is exponential in the order of the smaller graph. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
207
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
208
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
209
Parallelization of Stochastic Evolution
Published 2006“…The complexity involved in VLSI design and its sub-problems has always made them ideal application areas for non-eterministic iterative heuristics. …”
Get full text
masterThesis -
210
Parallelization of Iterative Heuristic for Performance-Driven Low-Power VLSI Standard Cell Placement.
Published 2003“…The complexity involved in VLSI design and its sub-problems has always made them ideal application areas for non-deterministic iterative heuristics. …”
Get full text
masterThesis -
211
A collaborative filtering recommendation framework utilizing social networks
Published 2023“…The framework is based on a modified version of the user-based collaborative filtering algorithm, which computes user similarity based on their ratings and social connections. …”
-
212
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
213
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
-
214
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
215
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
Published 2019“…This being said, computation tasks generated by IoT devices can be pro- cessed in less latency and with much lower energy consumption at the devices. To optimally deploy UAVs as mounted cloudlets, we formulate our problem as mixed integer program and then use an e cient meta-heuristic algorithm to generate optimized results for large scale IoT networks. …”
Get full text
Get full text
Get full text
masterThesis -
216
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2025“…This study presents two main contributions to the field: first, it investigates the integration of semi-transparent photovoltaic (STPV) technology with a hybrid battery energy storage system (BESS) and hydrogen (H2) storage in greenhouse applications. Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
Get full text
Get full text
Get full text
article -
217
-
218
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2024“…This study presents two main contributions to the field: first, it investigates the integration of semi-transparent photovoltaic (STPV) technology with a hybrid battery energy storage system (BESS) and hydrogen (H2) storage in greenhouse applications. Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
-
219
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text
-
220
DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs
Published 2025“…By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”