بدائل البحث:
algorithm within » algorithm its (توسيع البحث)
algorithm step » algorithm its (توسيع البحث), algorithm sma (توسيع البحث), algorithm survey (توسيع البحث)
step function » taste function (توسيع البحث)
cell function » cost function (توسيع البحث)
algorithm within » algorithm its (توسيع البحث)
algorithm step » algorithm its (توسيع البحث), algorithm sma (توسيع البحث), algorithm survey (توسيع البحث)
step function » taste function (توسيع البحث)
cell function » cost function (توسيع البحث)
-
1
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
منشور في 2020"…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …"
احصل على النص الكامل
article -
2
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
3
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
4
A parallel tabu search algorithm for VLSI standard-cell placement
منشور في 2000"…VLSI standard-cell placement is an NP-hard problem to which various heuristics have been applied. …"
احصل على النص الكامل
احصل على النص الكامل
article -
5
Adaptive step-size sign least mean squares
منشور في 2004"…A powerful adaptation scheme is used to adapt the step-size of the sign function inside the recursion of the sign algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
منشور في 2024"…This hybrid approach, the Improved Prairie Dog Optimization Algorithm (IPDOA) with the Genetic Algorithm (GA), utilizes the strengths of both algorithms to improve the overall optimization performance. …"
احصل على النص الكامل
-
7
-
8
High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm
منشور في 2025"…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …"
-
9
From Collatz Conjecture to chaos and hash function
منشور في 2023"…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …"
-
10
Tracking analysis of normalized adaptive algorithms
منشور في 2003"…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…"
احصل على النص الكامل
احصل على النص الكامل
article -
11
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
12
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
منشور في 2024"…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …"
-
13
Scatter Search algorithm for Protein Structure Prediction
منشور في 2016"…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
14
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
15
Timing influenced general-cell genetic floorplanner
منشور في 2020"…In this paper we present a timing-influenced floorplanner for general cell IC design. The floorplanner works in two phases. …"
احصل على النص الكامل
article -
16
New fault models and efficient BIST algorithms for dual-portmemories
منشور في 1997"…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
منشور في 2000"…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
منشور في 2003"…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…"
احصل على النص الكامل
احصل على النص الكامل
article -
19
A comparative study of ElGamal based digital signature algorithms
منشور في 2006"…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20