Search Results - (( evolution operation research algorithm ) OR ( variable activation function algorithm ))

Refine Results
  1. 1

    Global optimal analysis of variant genetic operations in solar tracking by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Genetic Algorithms (GAs), Evolution Strategies (ES), Evolutionary Programming (EP) and Genetic Programming (GP) are some of the best known types of Evolutionary Algorithm (EA)where it is a class of global search algorithms inspired by natural evolution. …”
    Article
  2. 2
  3. 3
  4. 4

    An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique by Hameed, Asaad Shakir

    Published 2021
    “…The objectives of this study are to employ the best crossover operator in the Discrete Differential Evolution (DDE) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Nature-Inspired cognitive evolution to play Ms. Pac-Man by Tse, Guan Tan, Jason Teo, Patricia Anthony

    Published 2011
    “…On the other hand, an evolutionary algorithm is to simulate the biological evolutionary processes that evolve potential solutions in order to solve the problems or tasks by applying the genetic operators such as crossover, mutation and selection into the solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment by Fam D.F., Koh S.P., Tiong S.K., Chong K.H.

    Published 2023
    “…Genetic Algorithm (GA) belongs to elementary stochastic optimization algorithms inspired by evolution.It points out the ability of simple representations using bit strings to encode complicated structures and the power of simple transformations to reach the desired solution. …”
    Conference Paper
  9. 9

    Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking by Shen, Jiazheng, Hong, Tang Sai, Fan, Luxin, Zhao, Ruixin, Mohd Ariffin, Mohd Khairol Anuar, As’arry, Azizan

    Published 2024
    “…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Data-Driven Approach to Modeling Biohydrogen Production from Biodiesel Production Waste: Effect of Activation Functions on Model Configurations by Hossain, S.K.S., Ayodele, B.V., Alhulaybi, Z.A., Alwi, M.M.A.

    Published 2022
    “…The RBFNN model with softmax as the hidden layer activation function and identity as the outer layer activation function has the least predictive performance, as indicated by an R2 of 0.403 and a RMSE of 301.55. …”
    Get full text
    Get full text
    Article
  11. 11

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Recent Evolutionary Algorithm Variants for Combinatorial Optimization Problem by Anniza, Hamdan, San Nah, Sze, Say Leng, Goh, Kang Leng, Chiew, Wei King, Tiong

    Published 2023
    “…Hybridization in evolutionary algorithm mechanisms such as initialization methods, local searches, specific design operators, and self-adaptive parameters enhance the algorithm’s performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation by Mehrkanoon, S., Moghavvemi, M., Fariborzi, H.

    Published 2007
    “…The time variant mixing matrix based on random vector with time variable elements are made. Several simulations obtain optimum results of implemented algorithm. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…The strength of the algorithm lies in the fact that it assists the evolution of a population of individuals who would thrive in the survival of the fittest towards the next generation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks by Sanni, Mistura Laide, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina, Anwar, Farhat, Ahmed, Gharib Subhi Mahmoud

    Published 2015
    “…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Vehicle routing problem: models and solutions by Liong, Choong Yeun, Wan Rosmanira Ismail, Khairuddin Omar, Mourad Zirour

    Published 2008
    “…Besides that, heuristic techniques have received wide interests in researchers’ effort to solve large scale VRPs. Among the recently applied heuristic techniques are genetic algorithm, evolution strategies and neural networks…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review by Zulkifli, Mansor, Irawan, Addie, Mohammad Fadhil, Abas

    Published 2023
    “…Emphasizing the need for adaptable, terrain-aware control algorithms, the review explores the untapped potential of machine learning and soft robotics in enhancing performance across diverse operational scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper