يعرض 1 - 20 نتائج من 248 نتيجة بحث عن '(((( algorithm like function ) OR ( algorithm 1 function ))) OR ( algorithm both function ))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities حسب Moinuddin, M.

    منشور في 2003
    "…Tracking analysis of the normalized least mean square (NLMS) algorithm is carried out in the presence of two sources of nonstationarities: 1) carrier frequency offset between transmitter and receiver; 2) random variations in the environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…For this purpose, logarithmic BLFs including both the trajectory errors and the errors between the quadcopters’ distances with the desired ones (for the formation goal) are proposed. …"
  4. 4
  5. 5

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 7

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …"
  8. 8

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9
  10. 10
  11. 11

    Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning حسب Sait, Sadiq M.

    منشور في 2003
    "…A series of experiments are performed to evaluate the efficiency of the algorithm. ISCAS-85/89 benchmark circuits are used and experimental results are reported and compared to earlier algorithms like GA and TS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12
  13. 13

    New fault models and efficient BIST algorithms for dual-portmemories حسب Amin, A.A.

    منشور في 1997
    "…These modifications allow multiple access of memory cells for increased test speed with minimal overhead on both silicon area and device performance. New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 14

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…SCA is a recent population based optimizer turned towards the optimal solution using a mathematical-based model based on sine and cosine trigonometric functions. As other optimization methods, SCA has main shortcoming in exploitation process when a non-linear constraints problem like ELD is tackled. …"
    احصل على النص الكامل
  15. 15

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  16. 16

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…It should be noted that, except EBCM, the other 10 new algorithms are inferior to the 4 state-of-the-art algorithms in terms of convergence speed and global search ability on CEC 2017 functions. …"
  17. 17

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications حسب Mohieddine Benammar (18103039)

    منشور في 2019
    "…The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …"
  18. 18

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
    احصل على النص الكامل
  19. 19

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20