找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Operations Research and Optimization; FOTA 2016, Kolkata, Samarjit Kar,Ujjwal Maulik,Xiang Li Conference proceedings 2018 Springer Nature

[复制链接]
楼主: 迅速
发表于 2025-3-30 10:42:33 | 显示全部楼层
发表于 2025-3-30 12:56:36 | 显示全部楼层
Ant Lion Optimization: A Novel Algorithm Applied to Load Frequency Control Problem in Power SystemALO algorithm. To judge the acceptability of ALO algorithm, the simulation results are compared with some recently published algorithms. The simulation results presented in this paper confirm that the proposed ALO algorithm significantly enhanced the relative stability of the power system and can be applied to the real-time problem.
发表于 2025-3-30 19:20:06 | 显示全部楼层
发表于 2025-3-31 00:30:38 | 显示全部楼层
发表于 2025-3-31 04:18:53 | 显示全部楼层
Conference proceedings 2018t information and technology, systems science, knowledge management, information and communication, supply chain and inventory control, scheduling, networks, transportation and logistics and finance. The book is a valuable resource for researchers, scientists and engineers from both academia and industry.
发表于 2025-3-31 09:05:18 | 显示全部楼层
Ageing and Priority-Based Scheduling for Uplink in WiMAX Networksheduling algorithm is proposed. A comparative study between the proposed scheduling algorithm and the existing scheduling algorithm shows the better performance in terms of maximizing the network throughput in given network, while minimizing the starvation of lower priority classes.
发表于 2025-3-31 09:10:40 | 显示全部楼层
Recognition System to Separate Text Graphics from Indian Newspaperoth spatial and frequency domain features from objects which are used for training and testing purpose using different classifiers. We have applied the techniques on Indian newspapers written in roman script and got satisfactory results over that.
发表于 2025-3-31 15:43:11 | 显示全部楼层
ICMP-DDoS Attack Detection Using Clustering-Based Neural Network Techniquesh cluster. MLP classifier is used to categorize the incoming clients as normal and attack. In this paper, we used CAIDA 2007 attack datasets and CAIDA 2013 anonymized trace datasets as pre-observed samples. The proposed method detects a DDoS attack with maximum efficiency of 97% and with a low false positive rate of 3.0%.
发表于 2025-3-31 18:21:03 | 显示全部楼层
10楼
发表于 2025-3-31 23:14:11 | 显示全部楼层
10楼
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-31 23:14
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表