Showing 1 - 20 results of 337 for search '(( algorithm machine function ) OR ( ((algorithm i) OR (algorithm using)) function ))', query time: 0.15s Refine Results
  1. 1

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  2. 2

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  3. 3

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”
  4. 4
  5. 5
  6. 6

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology by Senyuk, Mihail

    Published 2023
    “…Algorithms were tested using the test power system IEEE39. …”
    Get full text
    article
  7. 7

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  8. 8

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  9. 9

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  11. 11

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 12

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
  13. 13

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) by AlHamaydeh, Mohammad

    Published 2017
    “…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …”
    Get full text
    article
  14. 14

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
    Get full text
    article
  15. 15
  16. 16
  17. 17

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
  18. 18
  19. 19

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. </p><h3>Methods</h3><p dir="ltr">A cohort of Arab patients newly starting on warfarin had their dose calculated using CWD published in www.warfarindosing.org and were followed for 1 month. …”
  20. 20