Search Results - (( using (vectorisation OR factorization) based algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- using function »
-
1
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…This stochastic learning method is a useful addition to the existing methods for determining the center and smoothing factors of radial basis function neural networks, and it can also help the network more efficiently train. …”
Get full text
Get full text
Article -
2
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
Get full text
Get full text
Monograph -
4
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
Get full text
Get full text
Thesis -
5
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
6
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…The main objective of this research is to formulate unfolding transformation factor 2 and factor 4 methods into hash function design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Evaluation of lightning return stroke current using measured electromagnetic fields
Published 2012“…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
Get full text
Get full text
Thesis -
8
Disparity map algorithm for stereo matching process using local based method
Published 2022“…Global method performs a matching process using global energy or a probability function over the whole image. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
10
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Effect of fitness function on localization performance in range-free localization algorithm
Published 2024“…How to choose the best localization fitness function for a specific target is a key factor in determining whether the localization algorithm is accurate or not. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…Particularly, swmcan addresses multi-view data noise using the l1-norm and optimizes the objective function through a novel iterative reweighted method. …”
Get full text
Get full text
Thesis -
13
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization
Published 2018“…The advanced mean value and hybrid mean value methods are commonly used to evaluate the probabilistic constraint of reliability-based design optimization (RBDO) problems. …”
Get full text
Get full text
Article -
15
The Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP) Method for Solving Wireless Sensor Networks Optimization Problems in Smart Grid Applicatio...
Published 2018“…Our proposed method, named Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP), along with other three state-of-The-Art multi-objective optimization algorithms known as OMOPSO, NSGA-II and SPEA2, are utilized in this study. …”
Get full text
Get full text
Article -
16
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
17
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
18
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification
Published 2007“…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph
