Search Results - (( vendor selection based algorithm ) OR ( based optimization isotherm algorithm ))*
Search alternatives:
- optimization isotherm »
- vendor selection »
- selection based »
-
1
Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection
Published 2011“…However, little research has been done on overlapping method fuzzy c-means (FCM) and fuzzy c-varieties (FCV) clustering algorithms in compound selection research. Therefore, these two clustering algorithms are implemented and the performance is analyzed based on the effectiveness of the clustering results in terms of mean intercluster molecular dissimilarity (MIMDS) where these results are compared with one another. …”
Get full text
Get full text
Get full text
Article -
2
A gauss-newton approach for nonlinear optimal control problem with model-reality differences
Published 2017“…Here, the linear model-based optimal control model is considered, so as the optimal control law is constructed. …”
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Production and characterization of biochar derived from oil palm wastes, and optimization for zinc adsorption
Published 2015“…The incremental back propagation algorithm demonstrated the best results and which has been used as learning algorithm for ANN in combination with Genetic Algorithm in the optimization. …”
Get full text
Get full text
Thesis -
6
-
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
10
Modeling of Cu(II) adsorption from an aqueous solution using an Artificial Neural Network (ANN)
Published 2020“…The Fletcher-Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Article -
11
Modelling and simulation of hollow profile aluminium extruded product
Published 2015“…This process is an isothermal process with an extrusion ratio of 3.3. Subsequently, the optimized algorithm for these extrusion parameters was suggested based on the simulation results. …”
Get full text
Get full text
Get full text
Article -
12
Modeling of cu(ii) adsorption from an aqueous solution using an artificial neural network (ann)
Published 2020“…The Fletcher–Reeves conjugate gradient backpropagation (BP) algorithm was the best fit among all of the tested algorithms (mean squared error (MSE) of 3.84 and R2 of 0.989). …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
