Search Results - (( intelligence based flow algorithm ) OR ( intelligence system growth algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- growth algorithm »
- flow algorithm »
-
1
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
2
-
3
Application of intelligence based genetic algorithm for job sequencing problem on parallel mixed-model assembly line
Published 2010“…A heuristic algorithm was introduced to generate the initial population for intelligence based genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
7
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
Get full text
Get full text
Get full text
Citation Index Journal -
8
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
Article -
10
Analysis of bubble departure and lift-off boiling model using computational intelligence techniques and hybrid algorithms
Published 2024“…The bubble departure and lift-off boiling (BDL) model was studied using computational intelligence techniques and hybrid algorithms. Quite a few studies have predicted the relationship between wall heat fluxes and wall temperature in the form of flow boiling curves. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
INTELLIGENT OPTIMIZATION OF INTERLINE POWER FLOW CONTROLLER IN TRANSMISSION SYSTEM
Published 2010“…A new generation of FACTS controllers, particularly the Interline Power Flow Controller (IPFC) based on voltage source converter (VSC) provides fast power flow control flexibility. …”
Get full text
Get full text
Thesis -
12
An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification
Published 2022“…Besides, the biometric inputs like Human Face, Voice, Physical actions, EEG signals, etc. are cascaded with the computing module for robust and intelligent decision making. The hand postures are one of the most common biometric for system automation & feedback. …”
Get full text
Get full text
Article -
13
Online auto-tuned proportional-integral controller using particle swarm optimization for dual active bridge DC-DC converter
Published 2021“…APSO-PI is an auto-tuned PI using the PSO algorithm where the optimal values of Kp and Kiwere tuned at the initial control process only. …”
Get full text
Get full text
Thesis -
14
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
20
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis
