Search alternatives:
model function » model obfuscation (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
model function » model obfuscation (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
-
1
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
2
-
3
-
4
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
5
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
6
Motion Artifacts Correction From EEG and fNIRS Signals Using Novel Multiresolution Analysis
Published 2022Subjects: -
7
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
8
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …”
Get full text
Get full text
-
9
-
10
-
11
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
13
Second-order conic programming for data envelopment analysis models
Published 2022“…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
14
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
-
15
-
16
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
17
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
18
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
19
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
Published 2012Get full text
Get full text
masterThesis -
20
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”