Search Results - (( based constructive approach algorithm ) OR ( using function _ algorithm ))
Search alternatives:
- constructive approach »
- based constructive »
- using function »
-
1
Fast and optimal tuning of fractional order PID controller for AVR system based on memorizable-smoothed functional algorithm
Published 2022“…Therefore, this study proposes a modified smoothed function algorithm (MSFA) based method to tune the FOPID controller of AVR system since it requires fewer number of function evaluation per iteration. …”
Get full text
Get full text
Get full text
Article -
2
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…The experimental results obtained show some improvements on the predictive accuracy tasks when using the clustering results obtained. Finally, there are further improvements shown when a GA is applied to the whole framework of the classification task by using the WEKA C4.5 classifier and taking the predictive accuracy as the fitness function. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimization of Reservoir Operation using New Hybrid Algorithm
Published 2018“…In this research, a new hybrid approach of Artificial Fish Swarm Algorithm (AFSA) and Particle Swarm Optimization Algorithm (PSOA) is used to optimize Karun-4 reservoir, increase energy production and minimize downstream water shortages. …”
Get full text
Get full text
Article -
4
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…Instead of solving the original optimal control problem, the model-based optimal control problem is solved. The algorithm developed in this thesis contains three sub-algorithms. …”
Get full text
Get full text
Thesis -
5
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…The methodology is based on a theoretical approach which consists of value-based decision nature in construction VM, multicriteria group decision making, game theory, negotiation theory, and agent-based development. …”
Get full text
Get full text
Final Year Project -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
7
-
8
A new HMCR parameter of harmony search for better exploration
Published 2016“…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
Get full text
Get full text
Conference or Workshop Item -
9
A new HMCR parameter of harmony search for better exploration
Published 2015“…As a meta-heuristic algorithm, Harmony Search (HS) algorithm is a population-based meta-heuristics approach that is superior in solving diversified large scale optimization problems. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
A comparative study of clonal selection algorithm for effluent removal forecasting in septic sludge treatment plant
Published 2015“…In order to investigate the expected functionality of the required standard, the prediction of the effluent quality, namely biological oxygen demand, chemical oxygen demand and total suspended solid of an SSTP was modelled using an artificial intelligence approach. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Genetic algorithm techniques for the design of nonlinear microwave circuits
Published 2004“…In this report a hybrid method of Sample Balance Genetic Algorithm (SBGA) used to analyze nonlinear diode excited by RF circuit. …”
Get full text
Get full text
Get full text
Thesis -
13
A Stepper Motor Design Optimization Using
Published 2005“…There is a need to fill this void in the area of small-motor design, and develop a program using Genetic Algorithms (GAs) as an approach to achieve optimization. …”
Get full text
Get full text
Monograph -
14
Artificial Bee Colony-based satellite image contrast and brightness enhancement technique using DWT-SVD
Published 2014“…The proposed technique is based on the Artificial Bee Colony (ABC) algorithm using Discrete Wavelet Transform and Singular Value Decomposition (DWT-SVD). …”
Get full text
Get full text
Article -
15
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
16
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The significance of block cipher algorithms lies in their versatility and resilience. …”
Get full text
Get full text
Thesis -
17
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
Get full text
Get full text
Article -
18
Evolutionary-based feature construction with substitution for data summarization using DARA
Published 2012“…This approach allows initial features to be used more than once in constructing newly constructed features. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Self learning neuro-fuzzy modeling using hybrid genetic probabilistic approach for engine air/fuel ratio prediction
Published 2017“…A fitness function is proposed to deal with multi-objective problem without weight using a new composition method. …”
Get full text
Get full text
Get full text
Thesis -
20
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper
