يعرض 1 - 20 نتائج من 47 نتيجة بحث عن '(((( algorithm fc function ) OR ( algorithm allows function ))) OR ( algorithm brain function ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation حسب Raveendra Pilli (21633287)

    منشور في 2024
    "…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …"
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 11

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier حسب JAIN, SWETA

    منشور في 2023
    "…Earlier diagnosis of ASD from brain image is necessary for reducing the effect of disorder. …"
    احصل على النص الكامل
    احصل على النص الكامل
  12. 12

    Stochastic evolution algorithm for technology mapping حسب Al-Mulhem, A.S.

    منشور في 1998
    "…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    Simultaneous stabilization of multimachine power systems viagenetic algorithms حسب Abdel-Magid, Y.L.

    منشور في 1999
    "…The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems حسب Abdel Magid, Y.L.

    منشور في 2020
    "…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …"
    احصل على النص الكامل
    article
  16. 16

    New fault models and efficient BIST algorithms for dual-portmemories حسب Amin, A.A.

    منشور في 1997
    "…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18
  19. 19

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) حسب Lamaa, Karine H.

    منشور في 2018
    "…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 20

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"