بدائل البحث:
algorithm involved » algorithm novel (توسيع البحث)
يعرض 1 - 20 نتائج من 20 نتيجة بحث عن '(( algorithm involved functions ) OR ( algorithm python function ))*', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 1

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  2. 2

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) حسب AlHamaydeh, Mohammad

    منشور في 2017
    "…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …"
    احصل على النص الكامل
    article
  3. 3

    Second-order conic programming for data envelopment analysis models حسب Mourad, Nahia

    منشور في 2022
    "…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …"
    احصل على النص الكامل
    احصل على النص الكامل
  4. 4

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
    احصل على النص الكامل
    article
  5. 5

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6
  7. 7

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks حسب Haris M. Khalid (17017743)

    منشور في 2023
    "…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …"
  8. 8

    Minimizing using BBO and DFO methods حسب El Zeghondy, Jean

    منشور في 2022
    "…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 9

    On the Optimization of Band Gaps in Periodic Waveguides حسب Jamil Renno (14070771)

    منشور في 2025
    "…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …"
  10. 10

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
  11. 11

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB حسب Alice AbdelAleem (17753799)

    منشور في 2023
    "…Homozygosity mapping of ES data of this consanguineous family revealed multiple chromosomal regions of homozygosity stretches with the residing of VPS13B (chr8: 100830758G > A) and NAPB (Chr20: 23,375,774 A > C) variants within the largest homozygous blocks further supporting the disease-genes causal role. Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …"
  12. 12

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data حسب Tekli, Joe

    منشور في 2018
    "…This paper describes SemIndex+, a semantic-aware indexing and querying framework that allows semantic search, result selection, and result ranking of structured (relational DB-style), unstructured (IR-style), and partly structured (NoSQL) data. Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13
  14. 14

    Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining حسب Mohammadjafar Hadad (21142499)

    منشور في 2024
    "…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …"
  15. 15

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…ObjectiveThis study utilized various classical machine learning techniques, such as support vector machines, k-nearest neighbors, and random forests, in conjunction with a modified deep learning approach called DeepRaman. These algorithms were employed to distinguish and categorize bacterial endotoxins, following appropriate spectral pre-processing, which involved novel filtering techniques and advanced feature extraction methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory حسب Wehbi, Osama

    منشور في 2022
    "…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 17
  18. 18

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials حسب Ghouti, Lahouari

    منشور في 1997
    "…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …"
    احصل على النص الكامل
    masterThesis
  19. 19

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks حسب Insaf Kraidia (19198012)

    منشور في 2024
    "…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …"
  20. 20

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
    احصل على النص الكامل
    احصل على النص الكامل