Search Results - adoption based differential ((equation algorithm) OR (generation algorithm))*
Search alternatives:
- generation algorithm »
- based differential »
- equation algorithm »
- adoption based »
-
1
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
Get full text
Get full text
Thesis -
2
Wavelet neural networks based solutions for elliptic partial differential equations with improved butterfly optimization algorithm training
Published 2020“…In this study, a machine learning approach based on the unsupervised version of wavelet neural networks (WNNs) is used to solve two-dimensional elliptic partial differential equations (PDEs). …”
Get full text
Get full text
Get full text
Article -
3
A new operational matrices-based spectral method for multi-order fractional problems
Published 2020“…Here, an accurate and efficient computational scheme based on another new type of polynomial with the help of collocation method (CM) is presented for different nonlinear multi-order fractional differentials (NMOFDEs) and Bagley-Torvik (BT) equations. …”
Get full text
Get full text
Article -
4
Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system
Published 2020“…The MSGA is based on a combination of metaheuristic scanning and Genetic Algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Published 2021“…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. …”
Get full text
Get full text
Get full text
Article -
6
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…In this context, the proposed algorithm utilizes a new design for retrieving strong S- boxes based on standard firefly algorithm (SFA). …”
Get full text
Get full text
Thesis -
7
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
Get full text
Get full text
Thesis -
8
Agent-Based Model of Virtual Community Cohesion (S/O: 13443)
Published 2021“…Those relationships were then modelled using a set of mathematical equations. The formal specifications (differential equations) equations form the basis of algorithm development, which preceded the development of a virtual community cohesion prediction simulator. …”
Get full text
Get full text
Monograph -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis -
10
STUDIES ON THE NONLINEAR INTERACTIONS ASSOCIATED WITH MOORED SEMI SUBMERSIBLE OFFSHORE PLATFORMS
Published 2011“…The dynamic equilibrium conditions were satisfied through a set of coupled nonlinear differential equations for the six DOF motions. For representing the platform to mooring nonlinear interactions, the 6x6 mooring stiffness matrix was derived based on the mooring stiffness and on the fairlead coordinates relative to the structure CG. …”
Get full text
Get full text
Thesis -
11
Development of tool life prediction model of TiAlN coated tools during the high speed hard milling of AISI H13 steel
Published 2011“…Shunmugam et al. [7] also combined RSM with differential evolution and genetic algorithms to draw a comparison between these methods. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To analyze email contents, we adopt the Bag-of-Words (BoW) approach and generate feature vectors whose attributes are transformed based on the normalized term frequency-inverse document frequency. …”
Get full text
Get full text
Thesis
