-
1
Optimal selection of the forgetting matrix into an iterative learning control algorithm
منشور في 2005"…A recursive optimal algorithm, based on minimizing the input error covariance matrix, is derived to generate the optimal forgetting matrix and the learning gain matrix of a P-type iterative learning control (ILC) for linear discrete-time varying systems with arbitrary relative degree. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
منشور في 2022"…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …"
-
3
On the Optimization of Band Gaps in Periodic Waveguides
منشور في 2025"…For the first optimization scenario, distribution-free analysis showed that at intermediate function evaluation budgets, detectable differences emerge among algorithms, whereas in the second scenario, these differences diminish at higher evaluation budgets (with no significant pairwise contrasts), indicating convergence. …"
-
4
-
5
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…The data was used as training and testing sets to analyze certain machine learning algorithms in terms of performance (cost / benefit analysis) and accuracy (mean error square and confusion matrix). …"
احصل على النص الكامل
-
6
Complexities of special matrix multiplication problems
منشور في 1988"…This paper develops optimal algorithms to multiply an n × n symmetric tridiagonal matrix by: (i) an arbitrary n × m matrix using 2nm − m multiplications; (ii) a symmetric tridiagonal matrix using 6n − 7 multiplications; and (iii) a tridiagonal matrix using 7n −8 multiplications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
7
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
منشور في 2017"…The proposed algorithm keeps track of the transactions that read from one another and store this information in a single matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
-
9
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
منشور في 2019"…Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
10
A stochastic iterative learning control algorithm with application to an induction motor
منشور في 2004"…A recursive optimal algorithm, based on minimizing the input error covariance matrix, is derived to generate the learning gain matrix of a P-type ILC for linear discrete-time varying systems with arbitrary relative degree. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
Stochastic P-type/D-type iterative learning control algorithms
منشور في 2003"…The optimal algorithm is based on minimizing the trace of the input error covariance matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
12
On Higher-Order Iterative Learning Control Algorithm in Presence of Measurement Noise
منشور في 2005"…This paper addresses the optimality of HO-ILC in the sense of minimizing the control error covariance matrix in the presence of measurement noise. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
Optimality of first-order ILC among higher order ILC
منشور في 2006"…That is, an optimal HO-ILC does not add to the optimality of standard first-order ILC in the sense of minimizing the trace of the control error covariance matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
14
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
15
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
منشور في 2024"…Additionally, we applied the local interpretable model-agnostic explanations (LIME) algorithm to understand the contribution of selected features to the overall prediction. …"
-
16
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
منشور في 2024"…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …"
-
17
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
18
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
19
Information warfare. (c2015)
منشور في 2015"…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article