بدائل البحث:
model function » model obfuscation (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm 1 » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithms _ (توسيع البحث)
1 function » _ functional (توسيع البحث)
model function » model obfuscation (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm 1 » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithms _ (توسيع البحث)
1 function » _ functional (توسيع البحث)
-
1
-
2
-
3
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
4
-
5
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
منشور في 2023"…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …"
احصل على النص الكامل
article -
7
-
8
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
10
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …"
-
11
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013الموضوعات: احصل على النص الكامل
doctoralThesis -
12
Stochastic evolution algorithm for technology mapping
منشور في 1998"…SELF-Map is based on the Stochastic Evolution (SE) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
13
Ensemble Deep Random Vector Functional Link Neural Network for Regression
منشور في 2022"…To address this problem, we propose a random skip connection-based edRVFL, which can keep the diversity in the latent space. esc-RVFL is an ensemble scheme that utilizes several edRVFL-RSC models trained on the different folds of the training dataset. …"
-
14
Evolutionary algorithm for protein structure prediction
منشور في 2010"…In this paper, we present an improved genetic algorithm (GA) for predicting 3D structures of proteins based on the hydrophobic polar model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
15
-
16
A fuzzy basis function network for generator excitation control
منشور في 1997"…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
-
18
A neural networks algorithm for data path synthesis
منشور في 2003"…The algorithm is driven by a motion equation that determines the neurons firing conditions based on the modified Hopfield neural network model of computation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
20
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis