Search alternatives:
model function » model obfuscation (Expand Search)
based function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
model function » model obfuscation (Expand Search)
based function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
-
1
-
2
-
3
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
4
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
5
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
6
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
Get full text
article -
7
-
8
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
9
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
10
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
-
11
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
12
Stochastic evolution algorithm for technology mapping
Published 1998“…SELF-Map is based on the Stochastic Evolution (SE) algorithm. …”
Get full text
Get full text
article -
13
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…To address this problem, we propose a random skip connection-based edRVFL, which can keep the diversity in the latent space. esc-RVFL is an ensemble scheme that utilizes several edRVFL-RSC models trained on the different folds of the training dataset. …”
-
14
Evolutionary algorithm for protein structure prediction
Published 2010“…In this paper, we present an improved genetic algorithm (GA) for predicting 3D structures of proteins based on the hydrophobic polar model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
-
16
A fuzzy basis function network for generator excitation control
Published 1997“…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
Get full text
Get full text
article -
17
-
18
A neural networks algorithm for data path synthesis
Published 2003“…The algorithm is driven by a motion equation that determines the neurons firing conditions based on the modified Hopfield neural network model of computation. …”
Get full text
Get full text
Get full text
article -
19
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
20