يعرض 1 - 20 نتائج من 315 نتيجة بحث عن '(( algorithm machine function ) OR ((( algorithm using function ) OR ( algorithm its function ))))*', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control حسب Abu Zitar, Raed

    منشور في 2022
    "…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …"
  2. 2
  3. 3

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm حسب Saima Hassan (14918003)

    منشور في 2022
    "…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
  4. 4

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل
  5. 5

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
  6. 6
  7. 7

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …"
  9. 9

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 10

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems حسب Abu Zitar, Raed

    منشور في 2022
    "…The latter case is confirmed through 23 benchmark functions with different features using statistical and nonparametric tests. …"
    احصل على النص الكامل
  11. 11

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …"
    احصل على النص الكامل
    article
  12. 12

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments حسب Mohammadhasan Faghihi (22303057)

    منشور في 2024
    "…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
  13. 13

    Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures حسب Iryna Haponchyk (19691701)

    منشور في 2017
    "…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …"
  14. 14
  15. 15
  16. 16
  17. 17

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm حسب Ghulam Jillani Ansari (16896342)

    منشور في 2021
    "…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
  18. 18

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …"
    احصل على النص الكامل
  19. 19

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  20. 20