بدائل البحث:
most function » cost function (توسيع البحث), taste function (توسيع البحث)
its function » cost function (توسيع البحث)
most function » cost function (توسيع البحث), taste function (توسيع البحث)
its function » cost function (توسيع البحث)
-
1
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
Evolution Of Activation Functions for Neural Architecture Search
منشور في 2020"…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
3
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
-
4
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …"
-
5
-
6
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
7
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …"
-
8
Iterative Least Squares Functional Networks Classifier
منشور في 2007"…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
احصل على النص الكامل
احصل على النص الكامل
article -
9
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
10
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
منشور في 2022"…The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
-
11
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021"…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …"
احصل على النص الكامل
احصل على النص الكامل
-
12
A fuzzy basis function network for generator excitation control
منشور في 1997"…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
article -
13
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Machine learning (ML) methods are widely used in IDS. …"
-
14
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The performance of three machine learning (ML) algorithms was assessed to predict the wild blueberry harvest losses on the ground. …"
-
15
Mobile robots obstacles avoidance using dynamic window approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
16
-
17
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
احصل على النص الكامل
احصل على النص الكامل
-
18
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
-
19
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
منشور في 2022"…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …"
احصل على النص الكامل
-
20
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
منشور في 2023"…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …"
احصل على النص الكامل
article