Search alternatives:
models function » models foundations (Expand Search)
model function » model obfuscation (Expand Search)
models function » models foundations (Expand Search)
model function » model obfuscation (Expand Search)
-
1
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
2
-
3
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
4
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
5
Second-order conic programming for data envelopment analysis models
Published 2022“…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
6
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
-
7
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
Published 2024“…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
-
8
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
9
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
-
10
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997“…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
Get full text
Get full text
article -
11
Computational evluation of protein energy functions
Published 2014“…In this project, we carry out a computational evaluation of putative protein energy functions. Our findings show that the CHARMM energy model tends to be more appropriate for ab initio computational techniques that predict protein structures. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
13
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
14
-
15
-
16
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
17
-
18
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
19
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
Get full text
article -
20
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. …”