Search alternatives:
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
algorithm gene » algorithm goa (Expand Search), algorithm review (Expand Search)
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
algorithm gene » algorithm goa (Expand Search), algorithm review (Expand Search)
-
1
-
2
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …”
-
3
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
4
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
-
5
-
6
-
7
-
8
-
9
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
10
-
11
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
-
12
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
-
13
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
14
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
15
Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants
Published 2022“…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”
-
16
Timing influenced general-cell genetic floorplanner
Published 2020“…The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …”
Get full text
article -
17
-
18
A fuzzy basis function network for generator excitation control
Published 1997“…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
Get full text
Get full text
article -
19
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
20
Distributed dimension reduction algorithms for widely dispersed data
Published 2002“…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…”
Get full text
Get full text
Get full text
conferenceObject