咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 信息与通信工程
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程

主题

  • 4 篇 hunter prey opti...
  • 1 篇 weight average e...
  • 1 篇 internet of thin...
  • 1 篇 revenue
  • 1 篇 reliability
  • 1 篇 energy trading
  • 1 篇 multi-objective ...
  • 1 篇 cam mechanism
  • 1 篇 variational auto...
  • 1 篇 matlab
  • 1 篇 appliances
  • 1 篇 reliability engi...
  • 1 篇 taylor series
  • 1 篇 sensitivity
  • 1 篇 oscillators
  • 1 篇 privacy preserva...
  • 1 篇 key generation
  • 1 篇 optimized design
  • 1 篇 demand response
  • 1 篇 optimization

机构

  • 1 篇 st xaviers catho...
  • 1 篇 south china univ...
  • 1 篇 saveetha engn co...
  • 1 篇 chaitanya bharat...
  • 1 篇 st xaviers catho...
  • 1 篇 univ south easte...
  • 1 篇 univ coll engn d...
  • 1 篇 kongunadu coll e...
  • 1 篇 muthayammal engn...
  • 1 篇 chennai inst tec...
  • 1 篇 islamic univ mad...
  • 1 篇 hebei vocat univ...
  • 1 篇 hebei prov speci...

作者

  • 1 篇 preethi b. c.
  • 1 篇 sugitha g.
  • 1 篇 padmanaban sanje...
  • 1 篇 wang chao
  • 1 篇 g g. sahaya stal...
  • 1 篇 thanikanti sudha...
  • 1 篇 peng wei
  • 1 篇 alshmrany sami
  • 1 篇 lakshmi s. ayshw...
  • 1 篇 dharmalingam m.
  • 1 篇 thirumalai m.
  • 1 篇 yuvaraj t.

语言

  • 4 篇 英文
检索条件"主题词=Hunter Prey optimization algorithm"
4 条 记 录,以下是1-10 订阅
排序:
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
收藏 引用
PEER-TO-PEER NETWORKING AND APPLICATIONS 2024年 第2期17卷 911-923页
作者: G, G. Sahaya Stalin Sugitha, G. Lakshmi, S. Ayshwarya Preethi, B. C. St Xaviers Catholic Coll Engn Dept Informat Technol Nagercoil Tamil Nadu India Muthayammal Engn Coll Dept Comp Sci & Engn Rasipuram Tamil Nadu India Univ Coll Engn Dept Comp Sci & Engn Panruti Tamil Nadu India St Xaviers Catholic Coll Engn Dept Elect & Commun Engn Nagercoil Tamil Nadu India
Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the sensitive and personal data from the cloud computing system. A repeated... 详细信息
来源: 评论
optimization Design for Reliability of the Oscillating Follower Disk Cam Mechanism Based on Improved hunter-prey optimization algorithm
收藏 引用
IEEE ACCESS 2024年 12卷 182532-182546页
作者: Wang, Chao Peng, Wei Hebei Vocat Univ Technol & Engn Xingtai 054000 Peoples R China Hebei Prov Special Vehicle Modificat Technol Innov Xingtai 054000 Peoples R China South China Univ Technol Sch Mech & Automot Engn Guangzhou 510640 Peoples R China
Cam mechanism is widely used in engineering designs such as engines, presses and gear-cutting machines because of its advantages including high transmission efficiency, high reliability, and the ability to realize com... 详细信息
来源: 评论
Smart energy management for revenue optimization and grid independence in an Indian RDS
收藏 引用
ENERGY CONVERSION AND MANAGEMENT-X 2025年 26卷
作者: Yuvaraj, T. Thirumalai, M. Dharmalingam, M. Thanikanti, Sudhakar Babu Padmanaban, Sanjeevikumar Chennai Inst Technol Ctr Smart energy Syst Chennai 600069 India Saveetha Engn Coll Dept Elect & Commun Engn Chennai 602105 India Kongunadu Coll Engn & Technol Dept Elect & Commun Engn Tholurpatti 621215 India Chaitanya Bharathi Inst Technol Dept Elect & Elect Engn Hyderabad 500075 India Univ South Eastern Norway Dept Elect Engn IT & Cybernet Porsgrunn Norway
This study presents a novel smart energy management framework for the Indian 28-bus radial distribution system (RDS), optimizing energy consumption across residential, commercial, and industrial sectors. The framework... 详细信息
来源: 评论
Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based hunter prey Search algorithm for Strengthening Cybersecurity
收藏 引用
IETE JOURNAL OF RESEARCH 2024年 第10期70卷 7687-7700页
作者: Alshmrany, Sami Islamic Univ Madinah Fac Comp & Informat Syst Al Madinah Al Munawarah 42351 Saudi Arabia
Cybersecurity threat detection in the Internet of Things (IoT) identifies and mitigates risks associated with connected devices. The IoT devices are vulnerable to attacks as they do not contain any robust security mec... 详细信息
来源: 评论