بدائل البحث:
model function » model obfuscation (توسيع البحث)
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
cell function » cost function (توسيع البحث)
model function » model obfuscation (توسيع البحث)
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
cell function » cost function (توسيع البحث)
-
1
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
2
-
3
-
4
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis -
5
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
New fault models and efficient BIST algorithms for dual-portmemories
منشور في 1997"…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …"
احصل على النص الكامل
احصل على النص الكامل
article -
7
Motion Artifacts Correction From EEG and fNIRS Signals Using Novel Multiresolution Analysis
منشور في 2022الموضوعات: -
8
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
منشور في 2020"…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …"
احصل على النص الكامل
article -
9
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
10
-
11
-
12
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …"
احصل على النص الكامل
احصل على النص الكامل
-
13
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
14
-
15
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
16
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013الموضوعات: احصل على النص الكامل
doctoralThesis -
17
Second-order conic programming for data envelopment analysis models
منشور في 2022"…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
احصل على النص الكامل
احصل على النص الكامل
-
18
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
-
19
-
20
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis