بدائل البحث:
algorithm time » algorithm its (توسيع البحث), algorithm sma (توسيع البحث)
algorithm etc » algorithm its (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
algorithm time » algorithm its (توسيع البحث), algorithm sma (توسيع البحث)
algorithm etc » algorithm its (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
-
1
-
2
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
منشور في 2019"…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …"
-
3
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …"
احصل على النص الكامل
article -
4
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …"
-
5
-
6
-
7
-
8
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
-
9
-
10
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis -
11
-
12
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …"
-
13
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …"
-
14
BUC algorithm for iceberg cubes
منشور في 2003"…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
15
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
16
Timing influenced general-cell genetic floorplanner
منشور في 2020"…The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …"
احصل على النص الكامل
article -
17
-
18
A fuzzy basis function network for generator excitation control
منشور في 1997"…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
20
Distributed dimension reduction algorithms for widely dispersed data
منشور في 2002"…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject