بدائل البحث:
algorithm basis » algorithm analysis (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm basis » algorithm analysis (توسيع البحث)
using function » using fusion (توسيع البحث)
-
1
Radial basis function networks for contingency analysis of bulkpower systems
منشور في 1999"…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …"
احصل على النص الكامل
احصل على النص الكامل
article -
2
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
-
3
A fuzzy basis function network for generator excitation control
منشور في 1997"…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
article -
4
Learning continuous functions using decision tree learning algorithms
منشور في 2001احصل على النص الكامل
masterThesis -
5
BUC algorithm for iceberg cubes
منشور في 2003"…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
6
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
منشور في 2020"…The overall cost function has been developed using fuzzy logic. Several variants of the algorithm are proposed and compared together via simulation and experimental results are provided. r 2002 Elsevier Science Ltd. …"
احصل على النص الكامل
article -
7
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
منشور في 2020"…The overall cost function has been developed using fuzzy logic. Several variants of the algorithm are proposed and compared together via simulation and experimental results are provided. r 2002 Elsevier Science Ltd. …"
احصل على النص الكامل
article -
8
-
9
New enumeration algorithm for regular boolean functions
منشور في 2018"…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
11
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
12
-
13
-
14
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
منشور في 2023"…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
احصل على النص الكامل
-
15
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
منشور في 2024"…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
-
16
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
17
Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash
منشور في 2022"…In this way, an augmented function (Lagrange function) is formulated which serves as the basis for the equations that govern phase equilibrium. …"
-
18
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
منشور في 2017"…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …"
احصل على النص الكامل
article -
19
Android Malware Detection Using Machine Learning
منشور في 2024"…It was found that SVM using radial basis function (RBF) kernel achieved the highest performance with an accuracy of 99.5%. …"
احصل على النص الكامل
article -
20
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …"