-
1
-
2
-
3
-
4
Learning continuous functions using decision tree learning algorithms
Published 2001Get full text
masterThesis -
5
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …”
-
6
-
7
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
8
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
9
New enumeration algorithm for regular boolean functions
Published 2018“…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
-
11
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
12
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
13
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
14
-
15
-
16
-
17
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
18
-
19
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. This technique substantially reduces execution time. …”
Get full text
Get full text
Get full text
conferenceObject -
20
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. …”