Search alternatives:
algorithm involved » algorithm novel (Expand Search)
algorithm review » algorithm novel (Expand Search)
Showing 1 - 20 results of 34 for search '(( ((algorithm involved) OR (algorithm review)) functions ) OR ( algorithm python function ))*', query time: 0.12s Refine Results
  1. 1

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
    Get full text
    article
  2. 2

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  3. 3

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) by AlHamaydeh, Mohammad

    Published 2017
    “…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …”
    Get full text
    article
  4. 4

    Optimization Techniques for Directional Overcurrent Relay Coordination: A Comprehensive Review by Tareq Foqha (17947778)

    Published 2023
    “…It covers a wide range of techniques, including conventional and deterministic methods, metaheuristic algorithms, and hybrid approaches. The paper discusses the objective functions utilized in formulating relay coordination problem and presents the development of optimization methods for solving this problem. …”
  5. 5

    Second-order conic programming for data envelopment analysis models by Mourad, Nahia

    Published 2022
    “…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
    Get full text
    Get full text
  6. 6

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…This article presents the first comprehensive review of the evolution of RVFL model, which can serve as the extensive summary for the beginners as well as practitioners. …”
  7. 7

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …”
    Get full text
    Get full text
    Get full text
    article
  8. 8
  9. 9

    Platoon Transitional Maneuver Control System: A Review by Sareh Badnava (16891374)

    Published 2021
    “…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …”
  10. 10
  11. 11
  12. 12

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  13. 13

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
  14. 14

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif, Badran

    Published 2022
    “…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif Badran (16888785)

    Published 2022
    “…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…”
  16. 16

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 17
  18. 18

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …”
  19. 19
  20. 20

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”