Results (31)
Search Parameters:
Keyword: Comparative analysisSolving the SAT problem using Genetic Algorithm
In this paper we propose our genetic algorithm for solving the SAT problem. We introduce various crossover and mutation techniques and then make a comparative analysis between them in order to find out which techniques are the best suited for solving a SAT instance. Before the genetic algorithm is applied to an instance it is…
Read MoreThe Impact of Digitalization on Shipbuilding as Measured by Artificial Intelligence (AI) Maturity Models: a Systematic Review
Artificial Intelligence (AI) is reshaping the global shipbuilding sector, yet existing maturity models fail to capture the domain-specific complexities of this capital-intensive industry. This study reviews over 50 AI maturity models and introduces a specialized framework tailored for shipbuilding. The proposed model outlines four progressive stages—Beginner, Innovation, Integration, and Expert—across eight key dimensions: culture, resilience,…
Read MoreRobust Adaptive Feedforward Sliding Mode Current Controller for Fast-Scale Dynamics of Switching Multicellular Power Converter
Higher efficiency and lower losses are widely considered as the best metrics to optimize, in a high-power converter performance context. To provide a solution to the ever-increase of high switching frequencies challenges, we must explore soft-switching technologies to resolve interface issues and reduce the switching losses. This manuscript describes a comparative analysis between the fixed-bandwidth…
Read MoreRacial Categorization Methods: A Survey
Face explicitly provides the direct and quick way to evaluate human soft biometric information such as race, age and gender. Race is a group of human beings who differ from human beings of other races with respect to physical or social attributes. Race identification plays a significant role in applications such as criminal judgment and…
Read MoreA Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection
This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read More
