Search alternatives:
algorithm models » algorithm novel (Expand Search)
algorithm three » algorithm survey (Expand Search)
models function » models foundations (Expand Search)
three function » taste function (Expand Search)
model function » model obfuscation (Expand Search)
algorithm models » algorithm novel (Expand Search)
algorithm three » algorithm survey (Expand Search)
models function » models foundations (Expand Search)
three function » taste function (Expand Search)
model function » model obfuscation (Expand Search)
-
1
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
2
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
3
-
4
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
5
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
6
Computational evluation of protein energy functions
Published 2014“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
conferenceObject -
7
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997“…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
Get full text
Get full text
article -
8
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
9
-
10
-
11
Evolutionary algorithm for protein structure prediction
Published 2010“…In this paper, we present an improved genetic algorithm (GA) for predicting 3D structures of proteins based on the hydrophobic polar model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
12
-
13
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
14
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
15
Motion Artifacts Correction From EEG and fNIRS Signals Using Novel Multiresolution Analysis
Published 2022Subjects: -
16
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
17
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
Get full text
article -
18
A fuzzy basis function network for generator excitation control
Published 1997“…The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
Get full text
Get full text
article -
19
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. …”
-
20