يعرض 121 - 140 نتائج من 348 نتيجة بحث عن '(((( algorithm both function ) OR ( algorithm a function ))) OR ( algorithm its function ))*', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 121

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems حسب Abdel Magid, Y.L.

    منشور في 2020
    "…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. …"
    احصل على النص الكامل
    article
  2. 122

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
    احصل على النص الكامل
    article
  3. 123

    Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning حسب Sait, Sadiq M.

    منشور في 2003
    "…A series of experiments are performed to evaluate the efficiency of the algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 125

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …"
  6. 126
  7. 127

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms حسب Harmanani, H. M.

    منشور في 2007
    "…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 128

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 129

    Online dynamic ensemble deep random vector functional link neural network for forecasting حسب Ruobin Gao (16003195)

    منشور في 2023
    "…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). …"
  10. 130

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks حسب Haris M. Khalid (17017743)

    منشور في 2023
    "…To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …"
  11. 131
  12. 132

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem حسب Abu Zitar, Raed

    منشور في 2023
    "…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …"
    احصل على النص الكامل
  13. 133

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) حسب Lamaa, Karine H.

    منشور في 2018
    "…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 134

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
  15. 135

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
  16. 136

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…In addition, whether these algorithms have a search bias to the origin (i.e., the center of the search space) is investigated. …"
  17. 137
  18. 138

    Optimal multiobjective design of robust power system stabilizers using genetic algorithms حسب Abdel-Magid, Y.L.

    منشور في 2003
    "…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 139

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms حسب Abdel-Magid, Y. L.

    منشور في 2004
    "…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    article
  20. 140

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل