Search alternatives:
algorithm models » algorithm novel (Expand Search)
models function » models foundations (Expand Search)
model function » model obfuscation (Expand Search)
algorithm fc » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithm a (Expand Search)
algorithm models » algorithm novel (Expand Search)
models function » models foundations (Expand Search)
model function » model obfuscation (Expand Search)
algorithm fc » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithm a (Expand Search)
-
1
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
2
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
3
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997“…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
Get full text
Get full text
article -
4
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
5
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…This paper explores the calculation of European option prices on energy futures using a time-varying volatility model enhanced by a regime switching factor. We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
Get full text
article -
6
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. …”
-
7
-
8
-
9
Second-order conic programming for data envelopment analysis models
Published 2022“…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
10
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
-
11
-
12
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
13
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
-
14
-
15
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
16
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…This work employs machine learning methods to develop and test a technique for dynamic stability analysis of the mathematical model of a power system. A distinctive feature of the proposed method is the absence of a priori parameters of the power system model. …”
Get full text
article -
17
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
18
-
19
-
20
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”