يعرض 1 - 20 نتائج من 228 نتيجة بحث عن '(((( algorithm fc function ) OR ( algorithm from function ))) OR ( algorithm which function ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems حسب Abualigah, Laith

    منشور في 2023
    "…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
    احصل على النص الكامل
  2. 2
  3. 3

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 4
  5. 5

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning حسب Sait, Sadiq M.

    منشور في 2006
    "…Further, we compared the results of the iterative heuristics with a modified FM algorithm, named PowerFM, which targets power optimization. …"
    احصل على النص الكامل
    article
  6. 6

    Belief selection in point-based planning algorithms for POMDPs حسب Azar, Danielle

    منشور في 2017
    "…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 7

    Evolutionary algorithms for VLSI multi-objective netlist partitioning حسب Sait, Sadiq M.

    منشور في 2006
    "…Further, we compared the results of the iterative heuristics with a modified FM algorithm, named PowerFM, which targets power optimization. …"
    احصل على النص الكامل
    article
  8. 8

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  10. 10
  11. 11

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study حسب Youssef, H.

    منشور في 2020
    "…Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …"
    احصل على النص الكامل
    article
  13. 13

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  14. 14
  15. 15

    Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images حسب Abu Zitar, Raed

    منشور في 2023
    "…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …"
    احصل على النص الكامل
  16. 16

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
  17. 17

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…FS is an important data reduction step in data mining which finds the most representative features from the entire data. …"
  19. 19

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem حسب Mantawy, A. H.

    منشور في 2020
    "…The proposed algorithm, which is mainly based on genetic algorithms incorporates tabu search method to generate new population members in the reproduction phase of the genetic algorithm. …"
    احصل على النص الكامل
    article
  20. 20

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل