Search Results - (( using detection method algorithm ) OR ( evolution optimization cycle algorithm ))
Search alternatives:
- evolution optimization »
- optimization cycle »
- method algorithm »
- using detection »
- cycle algorithm »
-
1
Multiobjective differential evolution algorithm-based sizing of a standalone photovoltaic water pumping system
Published 2023“…Algorithms; Costs; Evolutionary algorithms; Flow of water; Life cycle; Meteorology; Multiobjective optimization; Optimization; Probability; Pumping plants; Pumps; Solar power generation; Differential Evolution; Lifecycle costs; Meteorological data; Multi-objective differential evolution algorithms; Objective functions; Photovoltaic; Photovoltaic water pumping; Solar waters; Loss of load probability…”
Article -
2
Sizing of a standalone photovoltaic water pumping system using a multi-objective evolutionary algorithm
Published 2023“…Algorithms; Costs; Evolutionary algorithms; Life cycle; Multiobjective optimization; Optimization; Probability; Pumping plants; Pumps; Water levels; Differential Evolution; Economic objectives; Multi objective evolutionary algorithms; Non-dominated Sorting; Objective functions; Photovoltaic; Photovoltaic water pumping; Pumping systems; Loss of load probability; algorithm; cost analysis; drawdown; multicriteria analysis; optimization; performance assessment; photovoltaic system; probability; pumping; water demand…”
Article -
3
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Then apply the MODE-based algorithm to optimize the weighting function of the control problem formulation for optimal performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
5
Estimation of small-scale kinetic parameters of escherichia coli (E. coli) model by enhanced segment particle swarm optimization algorithm ese-pso
Published 2023“…In this regard, the result of the ESe-PSO algorithm achieved superior accuracy compared with the Segment Particle Swarm Optimization (Se-PSO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evolution (DE) algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Hybridization Of Deterministic And Metaheuristic Approaches In Global Optimization
Published 2019“…In the analysis of the literature, Artificial Bees Colony (ABC) Algorithm has been selected as the metaheuristic approach to be improved its capability and efficiency to solve the global optimization problems. …”
Get full text
Get full text
Get full text
Thesis -
7
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
8
Automated Student Timetable Scheduling System based on Genetic Algorithm
Published 2019“…Genetic algorithm works based on natural evolutions that comprises of several iterations. …”
Get full text
Get full text
Get full text
Article -
9
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
10
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
12
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
Get full text
Get full text
Thesis -
13
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
14
Obfuscated Malware Detection: Impacts on Detection Methods
Published 2024“…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
Conference Paper -
15
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
16
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
18
-
19
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
