抗生素 发表于 2025-3-30 10:42:33

http://reply.papertrans.cn/71/7022/702154/702154_51.png

ETCH 发表于 2025-3-30 12:56:36

Ant Lion Optimization: A Novel Algorithm Applied to Load Frequency Control Problem in Power SystemALO algorithm. To judge the acceptability of ALO algorithm, the simulation results are compared with some recently published algorithms. The simulation results presented in this paper confirm that the proposed ALO algorithm significantly enhanced the relative stability of the power system and can be applied to the real-time problem.

祸害隐伏 发表于 2025-3-30 19:20:06

http://reply.papertrans.cn/71/7022/702154/702154_53.png

Gudgeon 发表于 2025-3-31 00:30:38

http://reply.papertrans.cn/71/7022/702154/702154_54.png

Focus-Words 发表于 2025-3-31 04:18:53

Conference proceedings 2018t information and technology, systems science, knowledge management, information and communication, supply chain and inventory control, scheduling, networks, transportation and logistics and finance. The book is a valuable resource for researchers, scientists and engineers from both academia and industry.

BILK 发表于 2025-3-31 09:05:18

Ageing and Priority-Based Scheduling for Uplink in WiMAX Networksheduling algorithm is proposed. A comparative study between the proposed scheduling algorithm and the existing scheduling algorithm shows the better performance in terms of maximizing the network throughput in given network, while minimizing the starvation of lower priority classes.

永久 发表于 2025-3-31 09:10:40

Recognition System to Separate Text Graphics from Indian Newspaperoth spatial and frequency domain features from objects which are used for training and testing purpose using different classifiers. We have applied the techniques on Indian newspapers written in roman script and got satisfactory results over that.

Pcos971 发表于 2025-3-31 15:43:11

ICMP-DDoS Attack Detection Using Clustering-Based Neural Network Techniquesh cluster. MLP classifier is used to categorize the incoming clients as normal and attack. In this paper, we used CAIDA 2007 attack datasets and CAIDA 2013 anonymized trace datasets as pre-observed samples. The proposed method detects a DDoS attack with maximum efficiency of 97% and with a low false positive rate of 3.0%.

2否定 发表于 2025-3-31 18:21:03

10楼

Parallel 发表于 2025-3-31 23:14:11

10楼
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Operations Research and Optimization; FOTA 2016, Kolkata, Samarjit Kar,Ujjwal Maulik,Xiang Li Conference proceedings 2018 Springer Nature