Search Results - (( based optimization methods algorithm ) OR ( using modification modified algorithm ))
Search alternatives:
- optimization methods »
- using modification »
- methods algorithm »
-
1
A modified n-th section line search in conjugate gradient methods for solving unconstrained optimization / Muhammad Imza Fakhri Jinudin
Published 2018“…These line search methods are tested based on six standard optimization test problems. …”
Get full text
Get full text
Thesis -
2
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
Get full text
Get full text
Thesis -
3
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In addition, two novel Jaya-based methods namely, the modified Jaya (MJaya) algorithm and quasi-oppositional modified Jaya (QOMJaya) algorithm are proposed to solve different MOOPF problems. …”
Get full text
Get full text
Thesis -
4
Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane
Published 2021“…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
New Quasi-Newton Equation And Method Via Higher Order Tensor Models
Published 2010“…By using a new equation, the BFGS method is modified. …”
Get full text
Get full text
Thesis -
6
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The solution set (i.e. optimized weight/bias matrix of ANN) provided by the optimized and improved genetic algorithm and modified BP based model is extracted and used in the design and development of a prototype device of the proposed model. …”
Get full text
Get full text
Thesis -
7
-
8
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…Based on the results of these simulations, we compared the number of iterations needed by each algorithm to arrive at the optimal solution and the CPU time taken for each algorithm to execute the search. …”
Get full text
Get full text
Monograph -
9
Improved stochastic gradient descent algorithm with mean-gradient adaptive stepsize for solving large-scale optimization problems
Published 2023“…Stochastic gradient descent (SGD) is one of the most common algorithms used in solving large unconstrained optimization problems. …”
Get full text
Get full text
Get full text
Article -
10
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
11
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…—In recent years, there has been increasing interest in intelligent optimization algorithms, such as the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
12
-
13
OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM
Published 2011“…In this thesis, a new optimization GA-based algorithm that emanates from modification of conventional GA to reduce the iterations number and the duration time, namely, semi-parallel operation genetic algorithm (SPOGA) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…The solution’s construction is modified using the concept of global best operator that is used in the Particle Swarm Optimization (PSO). …”
thesis::doctoral thesis -
15
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
16
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…When noise exists in training data, the decision boundary of SVM would deviate from the optimal hyperplane severely. To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…When noise exists in training data, the decision boundary of SVM would deviate from the optimal hyperplane severely. To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
Published 2013“…The problem was initially tackled by “exact methods” such as the branch and bound method, which is based on the exhaustive enumeration of a restricted region of solutions containing exact optimal solutions. …”
Get full text
Get full text
Get full text
Thesis -
19
File integrity monitor scheduling based on file security level classification
Published 2011“…File integrity monitoring tools are widely used to detect any malicious modification to these critical files. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
