Search Results - (( based evaluation method algorithm ) OR ( evolution identification using algorithm ))
Search alternatives:
- evolution identification »
- identification using »
- evaluation method »
- based evaluation »
- method algorithm »
- using algorithm »
-
1
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
2
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…This research paper explores the performance of binary nature-inspired optimization algorithms as feature selection to enhance the identification of human activities using wearable technology. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
4
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
Get full text
Get full text
Get full text
Article -
5
-
6
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019Get full text
Get full text
Conference or Workshop Item -
7
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Purpose – The purpose of this paper is to develop a hybrid algorithm using differential evolution (DE) and prediction error modeling (PEM) for identification of small-scale autonomous helicopter state-space model. …”
Get full text
Get full text
Get full text
Article -
8
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Autotuning PID Controllers for Quadplane Hybrid UAV using Differential Evolution Algorithm
Published 2024“…The unified RBF model is then used for autotuning the PID controller using the DE algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Performance of well known packet scheduling algorithms in the downlink 3GPP LTE system
Published 2009“…This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…Thus, this research aims to standardize and weigh the evaluation criteria of MaOO competitive algorithms base on fuzzy Delphi and new fuzzy-weighted zero-inconsistency (FWZIC) methods. …”
Get full text
Get full text
Thesis -
14
Performance analysis of two component carrier selection algorithms in the downlink LTE-A
Published 2013“…Performance evaluation is conducted using the the downlink Long Term Evolution-Advanced (LTE-A) as the simulation platform. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Then, the damage severities at the identified locations are assessed using genetic algorithm (GA), through defining a database to reveal the relationships between the energies obtained and damage severities. …”
Get full text
Get full text
Get full text
Thesis -
16
The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis
Published 2025“…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
Get full text
Get full text
Get full text
Article -
17
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
18
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
19
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis -
20
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis
