بدائل البحث:
algorithm three » algorithm survey (توسيع البحث)
three function » taste function (توسيع البحث)
يعرض 1 - 20 نتائج من 322 نتيجة بحث عن '(( ((algorithm using) OR (algorithm machine)) function ) OR ( algorithm three function ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 3

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  4. 4

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…A precise prediction of blueberry harvest losses is necessary to mitigate such losses. The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …"
  6. 6
  7. 7

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
  8. 8

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  10. 10

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm حسب Saima Hassan (14918003)

    منشور في 2022
    "…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
  11. 11

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) حسب AlHamaydeh, Mohammad

    منشور في 2017
    "…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …"
    احصل على النص الكامل
    article
  12. 12

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13
  14. 14

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …"
    احصل على النص الكامل
    article
  15. 15
  16. 16
  17. 17
  18. 18

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm حسب Ghulam Jillani Ansari (16896342)

    منشور في 2021
    "…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
  19. 19

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …"
    احصل على النص الكامل
  20. 20

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"