Search results for: Meta-heuristic Algorithms - Bridge of Knowledge

Search

Search results for: Meta-heuristic Algorithms

Filters

total: 1505
filtered: 1247

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: Meta-heuristic Algorithms

  • Microphone placement through meta-heuristic algorithms

    Publication

    - Year 2019

    Full text to download in external service

  • Optimal Placement of Phasor Measurement Unit in Power System using Meta-Heuristic Algorithms

    Publication

    - Electrotehnica, Electronica, Automatica - Year 2019

    The phasor measurement units (PMUs) play an important and vital role in power system monitoring and controlling, since they provide the power system phasors stamped with a common real time reference through a global positioning system (GPS). Indeed, from economical point of view it is not possible to set PMUs in all system buses due to the high cost and the requirement of more complex communication...

    Full text to download in external service

  • Heuristic scheduling algorithms for uniform load of computer system

    Publication

    - Year 2006

    W pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...

  • Integration of electric vehicle into smart grid: a meta heuristic algorithm for energy management between V2G and G2V

    Publication
    • G. Srihari
    • R. S. R. Krishnam Naidu
    • P. Falkowski-Gilski
    • P. Bidare Divakarachari
    • R. K. Varma Penmatsa

    - Frontiers in Energy Research - Year 2024

    Recently, Electric Vehicles (EV) have been providing fast response and substantial progress in the power generation model. Further, EVs are exploited as adaptable Energy Storage Systems (ESSs) and show a promising performance in ancillary service markets to increase the demand of Smart Grid (SG) integration. The expansion of Vehicle-to-Grid concept has created an extra power source when renewable energy sources are not available....

    Full text available to download

  • Marine and Cosmic Inspirations for AI Algorithms

    Publication

    Artificial Intelligence (AI) is a scientific area that currently sees an enormous growth. Various new algorithms and methods are developed and many of them meets practical, successful applications. Authors of new algorithms draw different inspirations. Probably the most common one is the nature. For example, Artificial Neural Networks were inspired by the structure of human brain and nervous system while the classic Genetic Algorithm...

    Full text available to download

  • Parallel tabu search for graph coloring problem

    Publication

    - Year 2006

    Tabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...

  • Generalized regression neural network and fitness dependent optimization: Application to energy harvesting of centralized TEG systems

    Publication

    - Energy Reports - Year 2022

    The thermoelectric generator (TEG) system has attracted extensive attention because of its applications in centralized solar heat utilization and recoverable heat energy. The operating efficiency of the TEG system is highly affected by operating conditions. In a series-parallel structure, due to diverse temperature differences, the TEG modules show non-linear performance. Due to the non-uniform temperature distribution (NUTD) condition,...

    Full text available to download

  • Artificial Neural Network based fatigue life assessment of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters

    Publication
    • R. Masoudi Nejad
    • N. Sina
    • W. Ma
    • W. Song
    • S. Zhu
    • R. Branco
    • W. Macek
    • A. Gholami

    - INTERNATIONAL JOURNAL OF FATIGUE - Year 2024

    The objective of this paper is to provide the fatigue life of riveted joints in AA2024 aluminum alloy plates and optimization of riveted joints parameters. At first, the fatigue life of the riveted joints in AA2024 aluminum alloy plates is obtained by experimental tests. Then, an artificial neural network is applied to estimate the fatigue life of riveted lap joints based on the number of lateral and longitudinal holes, punch pressure,...

    Full text to download in external service

  • Multimodal Particle Swarm Optimization with Phase Analysis to Solve Complex Equations of Electromagnetic Analysis

    Publication

    - Year 2020

    In this paper, a new meta-heuristic method of finding roots and poles of a complex function of a complex variable is presented. The algorithm combines an efficient space exploration provided by the particle swarm optimization (PSO) and the classification of root and pole occurrences based on the phase analysis of the complex function. The method initially generates two uniformly distributed populations of particles on the complex...

    Full text available to download

  • Władza misjonarzy. Zmierzch i świt świeckiej religii w Dolinie Krzemowej

    Publication

    - Year 2023

    "Władza misjonarzy" to książka o misjonarskim zapale zmieniania świata i o kryzysie świeckiej religii towarzyszącej liderom nowych technologii, o ich świętokradztwach i sprofesjonalizowanej pokucie mającej przywrócić harmonię technologicznego raju na ziemi z Alphabetem, Metą, Apple i TikTokiem w roli głównej. Także o skruszonych inżynierach, żałujących każdej chwili, którą poświęcili na wymyślanie uzależniających algorytmicznych rozwiązań...

    Full text to download in external service

  • Testing Stability of Digital Filters Using Multimodal Particle Swarm Optimization with Phase Analysis

    Publication

    - Year 2020

    In this paper, a novel meta-heuristic method for evaluation of digital filter stability is presented. The proposed method is very general because it allows one to evaluate stability of systems whose characteristic equations are not based on polynomials. The method combines an efficient evolutionary algorithm represented by the particle swarm optimization and the phase analysis of a complex function in the characteristic equation....

    Full text to download in external service

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Performance improvement of NN based RTLS by customization of NN structure - heuristic approach

    Publication

    - Year 2015

    The purpose of this research is to improve performance of the Hybrid Scene Analysis – Neural Network indoor localization algorithm applied in Real-time Locating System, RTLS. A properly customized structure of Neural Network and training algorithms for specific operating environment will enhance the system’s performance in terms of localization accuracy and precision. Due to nonlinearity and model complexity, a heuristic analysis...

    Full text to download in external service

  • ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION

    Publication

    - Year 2014

    The article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...

  • Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas

    This paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...

    Full text available to download

  • Evolutionary Algorithms in MPLS network designing

    Publication

    - Year 2008

    MPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....

    Full text to download in external service

  • Meta-narracja jako aranżacja miasta innowacyjnego...Studium przypadku miasta nadmorskiego = Meta-Narrative as an innovative arrangement of the city...Seaside town case study

    Publication

    - Year 2012

    W miastach współczesnych praktykowane jest "wdrażanie" nowo realizowanych elementów tkanki fizycznej w nowej meta-skali. Dotyczy to przestrzeni zabudowanej a także tkanki krajobrazowej, dzieje się bez względu na zastałe uwarunkowania. Meta-narracja to idea fragmentaryczna, niemająca związku z polityka architektoniczną w skali regionalnej czy narodowej, to opowieść nadmiernie rozbudowana: wzdłuż, wszerz i wzwyż. Sylwetka miasta...

  • Performance Evaluation of Preemption Algorithms in MPLS Networks

    Preemption is a traffic engineering technique in Multiprotocol Switching Networks that enables creation of high priority paths when there is not enough free bandwidth left on the route. Challenging part of any preemption method is to select the best set of paths for removal. Several heuristic methods are available but no wider comparison had been published before. In this paper, we discuss the dilemmas in implementing preemption...

    Full text available to download

  • Interventions reducing car usage: Systematic review and meta-analysis

    Publication

    - TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT - Year 2024

    This systematic literature review aimed to investigate the extent to which transport-related interventions induced a reduction in car use. Both qualitative synthesis and meta-analysis were employed. The synthesis included 31 original studies, while the meta-analysis included 21. Of the qualitatively synthesised studies, 74 % demonstrated that interventions were effective in reducing car use. The pooled estimates of the effects...

    Full text available to download

  • Application of genetic algorithms in graph searching problem

    Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...

  • RAGE as a Novel Biomarker for Prostate Cancer: A Systematic Review and Meta-Analysis

    Publication
    • C. C. Applegate
    • M. B. Nelappana
    • E. A. Nielsen
    • L. Kalinowski
    • I. T. Dobrucki
    • L. W. Dobrucki

    - Cancers - Year 2023

    The receptor for advanced glycation end-products (RAGE) has been implicated in driving prostate cancer (PCa) growth, aggression, and metastasis through the fueling of chronic inflammation in the tumor microenvironment. This systematic review and meta-analysis summarizes and analyzes the current clinical and preclinical data to provide insight into the relationships among RAGE levels and PCa, cancer grade, and molecular effects....

    Full text available to download

  • Finite-window RLS algorithms

    Publication

    - SIGNAL PROCESSING - Year 2022

    Two recursive least-squares (RLS) adaptive filtering algorithms are most often used in practice, the exponential and sliding (rectangular) window RLS algorithms. This popularity is mainly due to existence of low-complexity versions of these algorithms. However, these two windows are not always the best choice for identification of fast time-varying systems, when the identification performance is most important. In this paper, we...

    Full text available to download

  • A New Heuristic Algorithm for Effective Preemption in MPLS Networks

    Publication

    - Year 2006

    W artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • A bisection‐based heuristic for rapid EM‐driven multiobjective design of compact impedance transformers

    Design of microwave structures is a multiobjective task where several conflicting requirements have to be considered at the same time. For contemporary circuits characterized by complex geometries, multiobjective optimization cannot be performed using standard population‐based algorithms due to high cost of electromagnetic (EM) evaluations. In this work, we propose a deterministic approach for fast EM‐driven multiobjective design...

    Full text to download in external service

  • Comparison and Analysis of Service Selection Algorithms

    Publication

    - Year 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties

    Publication

    - Journal of Software and Systems Development - Year 2021

    Full text to download in external service

  • Meta-computations on the CLUSTERIX Grid

    Publication
    • R. Wyrzykowski
    • N. Meyer
    • T. Olas
    • L. Kuczynski
    • B. Ludwiczak
    • C. Czaplewski
    • S. Oldziej

    - Year 2007

    Full text to download in external service

  • New Algorithms for Adaptive Notch Smoothing

    The problem of extraction/elimination of a nonstationary complex sinusoidal signal buried in noise is considered. This problem is usually solved using adaptive notch filtering (ANF)algorithms. It is shown that accuracy of signal estimation can be increased if the results obtained from ANF are further processed using a cascade of appropriately designed filters. The resulting adaptive notch smoothing (ANS) algorithms can be employed...

    Full text available to download

  • A Meta-Analysis of Pulse Arrival Time Based Blood Pressure Estimation

    The paper presents a preliminary meta-analysis of the sample correlation between pulse arrival time (PAT) and blood pressure (BP). The aim of the study was to verify sample correlation coefficient between PAT and BP using an affine model BP = a · P AT + b for systolic and diastolic blood pressure. The databases included in the search were the IEEE Xplore Digital Library, Springer Link and Google Scholar. Only papers from 2005 to...

    Full text to download in external service

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publication
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Year 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Full text to download in external service

  • Interoperability Constraints in Service Selection Algorithms

    Publication

    - Year 2012

    In Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...

  • On zero-error codes produced by greedy algorithms

    We present two greedy algorithms that determine zero-error codes and lower bounds on the zero-error capacity. These algorithms have many advantages, e.g., they do not store a whole product graph in a computer memory and they use the so-called distributions in all dimensions to get better approximations of the zero-error capacity. We also show an additional application of our algorithms.

    Full text available to download

  • Swarm Algorithms in Modern Engineering Optimization Problems

    Publication

    Complexity of today engineering problems is constantly increasing. Scientists no longer are facing issues, for which simple, mathematical programming methods are sufficient. Issues like autonomic vehicle navigation or classification are considered to be challenging, and although there exist valid means to solve them, in some cases there still is some place for improvement. With emergence of a new type of optimization techniques...

    Full text to download in external service

  • Transcriptomic Effects of Estrogen Starvation and Induction in the MCF7 Cells. The Meta-analysis of Microarray Results

    Publication

    - CURRENT PHARMACEUTICAL BIOTECHNOLOGY - Year 2015

    Estrogen is one of the most important signaling molecules which targets a number of genes. Estrogen levels regulate cell proliferation and a plethora of metabolic processes, which may interfere with a range of medical conditions and drug metabolism. The MCF7 breast cancer cell line, expressing the estrogen receptor α, is a well-studied model of cellular answer to estrogen. The aim of this study was to characterize transcriptomic...

    Full text to download in external service

  • Extending Service Selection Algorithms with Interoperability Analysis

    Application development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...

    Full text to download in external service

  • Parallelization of video stream algorithms in kaskada platform

    Publication

    - Year 2011

    The purpose of this work is to present different techniques of video stream algorithms parallelization provided by the Kaskada platform - a novel system working in a supercomputer environment designated for multimedia streams processing. Considered parallelization methods include frame-level concurrency, multithreading and pipeline processing. Execution performance was measured on four time-consuming image recognition algorithms,...

  • A Survey on the Datasets and Algorithms for Satellite Data Applications

    This survey compiles insights and describes datasets and algorithms for applications based on remote sensing. The goal of this review is twofold: datasets review for particular groups of tasks and high-level steps of data flow between satellite instruments and end applications from an implementation and development perspective. The article outlines the generalized data processing pipelines, taking into account the variations in...

    Full text to download in external service

  • Molecular Modeling of Meta II Rhodopsin

    Publication

    - QSAR & COMBINATORIAL SCIENCE - Year 2006

    Full text to download in external service

  • Projecting procedure for meta-material fiber

    Publication

    - Year 2010

    We would like to show new way of derivation evolution equation for short pulses in dielectric waveguide including one model of metamaterial waveguide. This derivation model rely on projecting to the orthogonal basis. In our case to orthogonal basis for cylindrical waveguide.

    Full text to download in external service

  • Porównanie podejść do opisu kontekstu użycia z wykorzystaniem meta-modeli

    Publication

    Ocena użyteczności może się różnić w zależności od rodzaju użytkownika oraz okoliczności, w których używany jest produkt. Aby uwzględnić ten fakt, do analizy wprowadzane jest pojęcie kontekstu użycia. W referacie zaprezentowano porównanie podejść do opisu kontekstu użycia oraz włączenia go w analizę użyteczności. Jest to część badań w ramach projektu, którego celem jest identyfikacja i opis kontekstu użycia narzędzi UML. Referat...

  • Extinction Event Concepts for the Evolutionary Algorithms

    Publication

    - Przegląd Elektrotechniczny - Year 2012

    The main goal of this present paper is to propose a structure for a tool helping to determine how algorithm would react in a real live application, by checking it's adaptive capabilities in an extreme situation. Also a different idea of an additional genetic operator is being presented. As Genetic Algorithms are directly inspired by evolution, extinction events, which are elementary in our planet's development history, became...

    Full text available to download

  • Comparison of edge detection algorithms for electric wire recognition

    Publication

    Edge detection is the preliminary step in image processing for object detection and recognition procedure. It allows to remove useless information and reduce amount of data before further analysis. The paper contains the comparison of edge detection algorithms optimized for detection of horizontal edges. For comparison purposes the algorithms were implemented in the developed application dedicated to detection of electric line...

    Full text to download in external service

  • Parameters optimization in medicine supporting image recognition algorithms

    Publication

    - Year 2011

    In this paper, a procedure of automatic set up of image recognition algorithms' parameters is proposed, for the purpose of reducing the time needed for algorithms' development. The procedure is presented on two medicine supporting algorithms, performing bleeding detection in endoscopic images. Since the algorithms contain multiple parameters which must be specified, empirical testing is usually required to optimise the algorithm's...

  • Transcriptomic responses to wounding: meta-analysis of gene expression microarray data

    Publication

    - BMC GENOMICS - Year 2017

    Background A vast amount of microarray data on transcriptomic response to injury has been collected so far. We designed the analysis in order to identify the genes displaying significant changes in expression after wounding in different organisms and tissues. This meta-analysis is the first study to compare gene expression profiles in response to wounding in as different tissues as heart, liver, skin, bones, and spinal cord, and...

    Full text available to download

  • Algorithms of chemicals detection using raman spectra

    Raman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...

    Full text available to download

  • Comparison of thresholding algorithms for automatic overhead line detection procedure

    Publication

    The article presents an overview of the thresholding algorithms. It compares the algorithms proposed by Pun, Kittler, Niblack, Huang, Rosenfeld, Remesh, Lloyd, Riddler, Otsu, Yanni, Kapur and Jawahar. Additionally, it was tested how the tuning of the Pun, Jawahar and Niblack methods affects the thresholding efficiency and proposed a combination of the Pun algorithm with a priori algorithm. All presented algorithms have been implemented...

    Full text available to download

  • Face detection algorithms evaluation for the bank client verification

    Publication

    Results of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...

  • New approach to railway noise modeling employing Genetic Algorithms

    Publication

    Main goal of this paper was to describe an innovative method of noise prediction based on Genetic Algorithms. First part of the paper addresses the problem of growing noise, mainly in the context of a unified method for measuring noise. Further, Genetic Algorithms are described with regards to their fundamental features. Further a description is provided as to how Genetic Algorithms were used in the area of noise modeling. Next...

    Full text to download in external service

  • Impacts of salvage logging on biodiversity: A meta-analysis

    Publication
    • S. Thorn
    • C. Bässler
    • R. Brandl
    • P. Burton
    • R. Cahall
    • J. Campbell
    • J. Castro
    • C. Choi
    • T. Cobb
    • D. Donato... and 19 others

    - JOURNAL OF APPLIED ECOLOGY - Year 2018

    Full text to download in external service