Showing 1 - 20 results of 45 for search '(( algorithm ((potential functional) OR (brain function)) ) OR ( algorithm python function ))*', query time: 0.13s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation by Raveendra Pilli (21633287)

    Published 2024
    “…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
  5. 5
  6. 6
  7. 7

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  8. 8

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…Earlier diagnosis of ASD from brain image is necessary for reducing the effect of disorder. …”
    Get full text
    Get full text
  9. 9

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…Unlike most of the available neural networks based techniques, the proposed method utilizes the potential of RBFN in planning studies. The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  10. 10

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…Finally, we present potential future research directions/opportunities that can inspire the researchers to improve the RVFL’s architecture and learning algorithm further. …”
  11. 11
  12. 12

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms by Zhongqiang Ma (13765801)

    Published 2023
    “…It should be noted that, except EBCM, the other 10 new algorithms are inferior to the 4 state-of-the-art algorithms in terms of convergence speed and global search ability on CEC 2017 functions. …”
  13. 13

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images by Abu Zitar, Raed

    Published 2023
    “…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …”
    Get full text
  14. 14

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”
  15. 15

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems by Abu Zitar, Raed

    Published 2022
    “…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …”
    Get full text
  16. 16

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  17. 17

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash by Ilias K. Nikolaidis (9217172)

    Published 2022
    “…In this way, an augmented function (Lagrange function) is formulated which serves as the basis for the equations that govern phase equilibrium. …”
  18. 18
  19. 19
  20. 20

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”