بدائل البحث:
algorithm involved » algorithm novel (توسيع البحث)
algorithm review » algorithm novel (توسيع البحث)
يعرض 1 - 20 نتائج من 34 نتيجة بحث عن '(( ((algorithm involved) OR (algorithm review)) functions ) OR ( algorithm python function ))*', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
    احصل على النص الكامل
    article
  2. 2

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  3. 3

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) حسب AlHamaydeh, Mohammad

    منشور في 2017
    "…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …"
    احصل على النص الكامل
    article
  4. 4

    Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review حسب Tareq Foqha (17947778)

    منشور في 2023
    "…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. The paper discusses the objective functions utilized in formulating relay coordination problem and presents the development of optimization methods for solving this problem. …"
  5. 5

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
    احصل على النص الكامل
    احصل على النص الكامل
  6. 6

    Random vector functional link network: Recent developments, applications, and future directions حسب A.K. Malik (16003193)

    منشور في 2023
    "…This article presents the first comprehensive review of the evolution of RVFL model, which can serve as the extensive summary for the beginners as well as practitioners. …"
  7. 7

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8
  9. 9

    Platoon Transitional Maneuver Control System: A Review حسب Sareh Badnava (16891374)

    منشور في 2021
    "…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …"
  10. 10
  11. 11
  12. 12

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  13. 13

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks حسب Haris M. Khalid (17017743)

    منشور في 2023
    "…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …"
  14. 14

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif, Badran

    منشور في 2022
    "…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature حسب Saif Badran (16888785)

    منشور في 2022
    "…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…"
  16. 16

    Minimizing using BBO and DFO methods حسب El Zeghondy, Jean

    منشور في 2022
    "…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 17
  18. 18

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …"
  19. 19
  20. 20

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"