Showing 1 - 20 results of 236 for search '(( algorithm model function ) OR ( algorithm from function ))', query time: 0.08s Refine Results
  1. 1

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  2. 2
  3. 3
  4. 4
  5. 5

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
    Get full text
    Get full text
    article
  6. 6
  7. 7
  8. 8

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …”
    Get full text
    Get full text
  9. 9
  10. 10
  11. 11

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12
  13. 13

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
    Get full text
    Get full text
  14. 14

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
  15. 15
  16. 16
  17. 17
  18. 18

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems by Tabbara, Mazen R.

    Published 2017
    “…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 19
  20. 20

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”