بدائل البحث:
algorithm involved » algorithm novel (توسيع البحث)
algorithm review » algorithm novel (توسيع البحث)
algorithm involved » algorithm novel (توسيع البحث)
algorithm review » algorithm novel (توسيع البحث)
-
1
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
احصل على النص الكامل
article -
2
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
3
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
منشور في 2017"…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …"
احصل على النص الكامل
article -
4
Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review
منشور في 2023"…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. The paper discusses the objective functions utilized in formulating relay coordination problem and presents the development of optimization methods for solving this problem. …"
-
5
Second-order conic programming for data envelopment analysis models
منشور في 2022"…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
احصل على النص الكامل
احصل على النص الكامل
-
6
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…This article presents the first comprehensive review of the evolution of RVFL model, which can serve as the extensive summary for the beginners as well as practitioners. …"
-
7
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
منشور في 2012"…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
-
9
Platoon Transitional Maneuver Control System: A Review
منشور في 2021"…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …"
-
10
-
11
-
12
Large language models for code completion: A systematic literature review
منشور في 2024"…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
13
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
منشور في 2023"…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …"
-
14
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
15
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
منشور في 2022"…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…"
-
16
Minimizing using BBO and DFO methods
منشور في 2022"…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
17
-
18
On the Optimization of Band Gaps in Periodic Waveguides
منشور في 2025"…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …"
-
19
-
20
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"