Search Results - (( parameter identification learning algorithm ) OR ( evolution optimization path algorithm ))
Search alternatives:
- parameter identification »
- identification learning »
- evolution optimization »
- learning algorithm »
- optimization path »
- path algorithm »
-
1
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
Get full text
Get full text
Thesis -
2
Development of an improved GWO algorithm for solving optimal paths in complex vertical farms with multi-robot multi-tasking
Published 2024“…The EPDE-GWO algorithm is compared with Genetic Algorithm (GA), Simulated Annealing (SA), Dung Beetle Optimizer (DBO), and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Get full text
Article -
3
-
4
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
Published 2007“…Roadways and telephone systems are the examples of them. Genetic Algorithms (GA), pioneered by John Holland, applies the principle of evolution found in nature to the problem of finding an optimal solution. …”
Get full text
Get full text
Thesis -
5
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…This solution addresses efficient and optimal routing path construction for cost and quality metrics of the application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Literature Review of Optimization Techniques for Chatter Suppression In Machining
Published 2011“…Various algorithms can be applied in the optimization of machining problems; however, Differential Evolution is the most appropriate for use in chatter suppression, being less time consuming, locally optimal, and more robust than both Genetic Algorithms, despite their wide applications, and Sequential Quadratic Programming, which is a famous conventional algorithm.…”
Get full text
Get full text
Get full text
Article -
7
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…This thesis proposes derivative free learning, using finite difference, methods for fixed size RBF network in comparison to gradient based learning for the application of system identification. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparative analysis of spiral dynamic algorithm and artificial bee colony optimization for position control of flexible link manipulators
Published 2024“…By integrating the ABC algorithm into the manipulator's control system, the goal is to enhance its ability to plan paths and optimize trajectories. …”
Get full text
Get full text
Get full text
Article -
9
A multi-objective genetic type-2 fuzzy extreme learning system for the identification of nonlinear dynamic systems
Published 2017“…The proposed algorithm benefits from the combination of extreme learning machine (ELM) and non-dominated sorting genetic algorithm (NSGAII) to tune the parameters of the consequent and antecedent parts of the IT2FLS, respectively. …”
Get full text
Get full text
Article -
10
Wavelet network based online sequential extreme learning machine for dynamic system modeling
Published 2013“…This attains good performance at extremely fast learning. The initial kernel parameters of WN played a big role to ensure fast and better learning performance. …”
Get full text
Conference or Workshop Item -
11
Simultaneous computation of model order and parameter estimation for system identification based on opposition-based simulated Kalman filter
Published 2018“…Simultaneous Model Order and Parameter Estimation (SMOPE) has been proposed to address system identification problem efficiently using optimization algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
13
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
14
Hybrid genetic algorithm with multi-parents recombination for job shop scheduling problems / Ong Chung Sin
Published 2013“…This mechanism is restricted to search the possible solutions in a critical path. Modification on the path by using neighborhood search significantly reduces the total length of the makespan. …”
Get full text
Get full text
Get full text
Thesis -
15
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
16
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
Get full text
Get full text
Thesis -
17
Wavelet network: online sequential extreme learning machine for nonlinear dynamic systems identification
Published 2015“…A single hidden layer feedforward neural network (SLFN) with online sequential extreme learning machine (OSELM) algorithm has been introduced and applied in many regression problems successfully. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The method of selection of the input variables, the number of rules, and the learning rate are briefly discussed. Three methods for choosing the initial parameter of the fuzzy model are considered, namely the on-line, the off-line, and the random initial parameters. …”
Get full text
Get full text
Get full text
Article -
20
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article
