Showing 121 - 140 results of 348 for search '(( algorithm protein function ) OR ((( algorithm a function ) OR ( algorithm its function ))))', query time: 0.17s Refine Results
  1. 121

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …”
    Get full text
    article
  2. 122

    Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning by Sait, Sadiq M.

    Published 2003
    “…A series of experiments are performed to evaluate the efficiency of the algorithm. …”
    Get full text
    Get full text
    article
  3. 123

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers by Mansour, Nashat

    Published 1997
    “…The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …”
    Get full text
    Get full text
    Get full text
    article
  4. 124

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …”
  5. 125
  6. 126

    An incremental approach for test scheduling and synthesis using genetic algorithms by Harmanani, H.

    Published 2017
    “…The method is based on a genetic algorithm that efficiently explores the testable design space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 127

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms by Harmanani, H. M.

    Published 2007
    “…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
    Get full text
    Get full text
    Get full text
    article
  8. 128

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems by Tabbara, Mazen R.

    Published 2017
    “…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 129

    Online dynamic ensemble deep random vector functional link neural network for forecasting by Ruobin Gao (16003195)

    Published 2023
    “…<p>This paper proposes a three-stage online deep learning model for time series based on the ensemble deep random vector functional link (edRVFL). …”
  10. 130

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
  11. 131
  12. 132

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities by Moinuddin, M.

    Published 2003
    “…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. …”
    Get full text
    Get full text
    article
  13. 133

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. …”
    Get full text
  14. 134

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 135

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”
  16. 136

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-Ani (17541447)

    Published 2023
    “…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
  17. 137

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms by Zhongqiang Ma (13765801)

    Published 2023
    “…In addition, whether these algorithms have a search bias to the origin (i.e., the center of the search space) is investigated. …”
  18. 138

    Optimal multiobjective design of robust power system stabilizers using genetic algorithms by Abdel-Magid, Y.L.

    Published 2003
    “…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …”
    Get full text
    Get full text
    article
  19. 139

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms by Abdel-Magid, Y. L.

    Published 2004
    “…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
    Get full text
    article
  20. 140

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text