بدائل البحث:
models function » models foundations (توسيع البحث)
model function » model obfuscation (توسيع البحث)
models function » models foundations (توسيع البحث)
model function » model obfuscation (توسيع البحث)
-
1
-
2
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
3
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
4
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013الموضوعات: احصل على النص الكامل
doctoralThesis -
5
Second-order conic programming for data envelopment analysis models
منشور في 2022"…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
احصل على النص الكامل
احصل على النص الكامل
-
6
Ensemble Deep Random Vector Functional Link Neural Network for Regression
منشور في 2022"…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …"
-
7
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
منشور في 2024"…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …"
-
8
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
9
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
-
10
New fault models and efficient BIST algorithms for dual-portmemories
منشور في 1997"…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …"
احصل على النص الكامل
احصل على النص الكامل
article -
11
Computational evluation of protein energy functions
منشور في 2014"…In this project, we carry out a computational evaluation of putative protein energy functions. Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
منشور في 2019"…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …"
احصل على النص الكامل
احصل على النص الكامل
-
13
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
14
-
15
-
16
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
17
-
18
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
19
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
احصل على النص الكامل
article -
20
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
منشور في 2023"…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. …"