Search alternatives:
using function » using fusion (Expand Search)
a function » _ functional (Expand Search)
using function » using fusion (Expand Search)
a function » _ functional (Expand Search)
-
1
New enumeration algorithm for regular boolean functions
Published 2018“…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
2
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
3
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
Published 2016Subjects: Get full text
doctoralThesis -
4
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
5
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
6
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023“…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
Get full text
-
7
Iterative Least Squares Functional Networks Classifier
Published 2007“…The performance of this new intelligent systems scheme is demonstrated and examined using real-world applications. A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …”
Get full text
Get full text
article -
8
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
9
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…Finally, we present potential future research directions/opportunities that can inspire the researchers to improve the RVFL’s architecture and learning algorithm further. </p> <h2>Other Information</h2> <p>Published in: Applied Soft Computing<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/ </a> <br> See article on publisher's website: <a href="http://dx.doi.org/10.1016/j.asoc.2023.110377" target="_blank">http://dx.doi.org/10.1016/j.asoc.2023.110377</a> </p>…”
-
10
-
11
-
12
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
13
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
14
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
16
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
-
17
-
18
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”
-
19
-
20
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”