Showing 1 - 20 results of 349 for search '(( algorithm a function ) OR ((( algorithm basis function ) OR ( algorithm python function ))))', query time: 0.17s Refine Results
  1. 1

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
    Get full text
    Get full text
    article
  2. 2

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
    Get full text
    Get full text
    article
  3. 3

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
  4. 4

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  6. 6

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  7. 7

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
    Get full text
    article
  9. 9

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm by Youssef, H.

    Published 2020
    “…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …”
    Get full text
    article
  10. 10

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  11. 11

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  12. 12
  13. 13

    An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive by Rahman, M. A.

    Published 2006
    “…A radial basis function network (RBFN) is utilized for online tuning of the PI controller parameters to ensure optimum drive performance under different disturbances. …”
    Get full text
    article
  14. 14

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm by De Rochechouart, Maxence

    Published 2023
    “…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
    Get full text
  15. 15

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash by Ilias K. Nikolaidis (9217172)

    Published 2022
    “…In this way, an augmented function (Lagrange function) is formulated which serves as the basis for the equations that govern phase equilibrium. …”
  16. 16

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
  17. 17
  18. 18
  19. 19

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  20. 20

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject