Search Results - (( evolution computing techniques ) OR ( solution making techniques ))*
Search alternatives:
- computing techniques »
- making techniques »
- solution making »
-
1
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Mobile edge computing (MEC) is a well-known technique to support delay-sensitive applications at the edge of mobile networks. …”
Get full text
Get full text
Thesis -
2
Applications of Mash-ups for a Digital Journal
Published 2008“…The WWW is currently experiencing a revolutionary growth due to numerous emerging tools, techniques and concepts. Digital journals thus need to transform themselves to cope with this evolution of the web. …”
Get full text
Get full text
Get full text
Article -
3
A novel cell-selection optimization handover for long-term evolution (LTE) macrocellusing fuzzy TOPSIS
Published 2016“…To address this issue, we propose a multiple-criteria decision-making method. In this method, we use an integrated fuzzy technique for order preference by using similarity to ideal solution (TOPSIS) on S-criterion, availability of resource blocks (RBs), and uplink signal-to-interference-plus-noise ratio. …”
Get full text
Get full text
Article -
4
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…These fine-tuning techniques continue to be the object of ongoing research. …”
Get full text
Get full text
Article -
5
Concept Drift Evolution In Machine Learning Approaches: A Systematic Literature Review
Published 2020“…Moreover, it is essential to understand the existing Concept Drift handling techniques to determine their associated pitfalls and propose robust solutions. …”
Get full text
Get full text
Article -
6
Improvement of SCTP congestion control in the LTE-A network
Published 2015“…Concretely we used the multi-criteria decision-making (MCDM) technique, especially the utilization of the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). …”
Get full text
Get full text
Article -
7
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks : A Systematic Review
Published 2022“…Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
9
Genetic Mutation of Cowpea as a Constrained Stochastic Optimization Problem in Sustainability
Published 2023“…However, uncertainties surround the genetic engineering process, potentially making genetic mutation for sustainability a constrained stochastic optimization (CSO) problem. …”
Get full text
Get full text
Get full text
Article -
10
Mobility management for seamless handover in carrier aggregation heterogeneous networks deployment scenario of long term evolution-advanced
Published 2018“…Attaining an optimal solution for HCPs selection is subjected to compromise between LBO and HPO functions, thus leading to inefficient handover decision making. …”
Get full text
Get full text
Thesis -
11
Improved whale optimization algorithm for feature selection in Arabic sentiment analysis
Published 2019“…To help individuals or companies make a systematic and more accurate decisions, sentiment analysis (SA) is used to evaluate the polarity of reviews. …”
Get full text
Get full text
Article -
12
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
Get full text
Get full text
Thesis -
13
Differential evolution technique of HEPWM for three-phase voltage source inverter
Published 2016“…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
Get full text
Get full text
Get full text
Article -
14
Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter
Published 2018“…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Modeling 2D appearance evolution for 3D object categorization
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
HEAT EXCHANGER NETWORK SYNTHESIS AND OPTIMIZATION BY PINCH ANALYSIS AND DIFFERENTIAL EVOLUTION METHOD
Published 2016“…This metadology way uses an algorithm which combines Pinch Design Method and Differential Evolution Method. In this technique, the Heat Exchanger Network synthesis is carried out in three levels. …”
Get full text
Get full text
Thesis -
17
Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization
Published 2024“…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
Get full text
Get full text
Article -
18
-
19
Computational intelligence based technique for solving economic dispatch problem / Nur Azzammudin Rahmat
Published 2016“…Therefore, this research proposes a new computational technique termed as Differential Evolution Immunized Ant Colony Optimization (DEIANT) as an approach to solve the complex economic dispatch process. …”
Get full text
Get full text
Book Section -
20
Major issues in the development of a Hacker's Code of Ethics / Ahmad Hafidz Baharom Alam Shah
Published 2005“…The first day, the computer was invented. The next day it was hacked. …”
Get full text
Get full text
Thesis
