Search alternatives:
models function » models foundations (Expand Search)
model function » model obfuscation (Expand Search)
Showing 1 - 20 results of 159 for search '(( algorithm brain function ) OR ( algorithm ((models function) OR (model function)) ))', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
    Get full text
    Get full text
  6. 6

    Ensemble Deep Random Vector Functional Link Neural Network for Regression by Minghui Hu (2457952)

    Published 2022
    “…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
  7. 7

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation by Raveendra Pilli (21633287)

    Published 2024
    “…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
  8. 8
  9. 9

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
  10. 10

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
    Get full text
    Get full text
    article
  11. 11

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…In this project, we carry out a computational evaluation of putative protein energy functions. Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
    Get full text
    Get full text
  13. 13

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
    Get full text
    Get full text
    article
  14. 14
  15. 15
  16. 16

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17
  18. 18

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  19. 19

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
    Get full text
    article
  20. 20

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-Ani (17541447)

    Published 2023
    “…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. …”