يعرض 1 - 20 نتائج من 236 نتيجة بحث عن '(( algorithm from function ) OR ( algorithm model function ))', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 1

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  2. 2
  3. 3
  4. 4
  5. 5

    A genetic-based algorithm for fuzzy unit commitment model حسب Mantawy, A.H.

    منشور في 2000
    "…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6
  7. 7
  8. 8

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
  9. 9
  10. 10
  11. 11

    Evolutionary algorithm for predicting all-atom protein structure حسب Mansour, Nashat

    منشور في 2011
    "…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12
  13. 13

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
    احصل على النص الكامل
    احصل على النص الكامل
  14. 14

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …"
  15. 15
  16. 16
  17. 17
  18. 18

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 19
  20. 20

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"