يعرض 1 - 20 نتائج من 103 نتيجة بحث عن '(( ((algorithm python) OR (algorithm both)) function ) OR ( algorithm allows functional ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    New fault models and efficient BIST algorithms for dual-portmemories حسب Amin, A.A.

    منشور في 1997
    "…New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  6. 6

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks حسب Ioannis A. Tsalafoutas (14776939)

    منشور في 2025
    "…The modulation transfer function (MTF) and the signal‐to‐noise‐ratio (SNR) dependence on exposure conditions and post‐processing algorithms do not always follow the same trends for raw and clinical images and/or different manufacturers, while the signal‐difference‐to‐noise‐ratio (SDNR) and the detectability index (d′), despite their differences, seem more appropriate to characterize IQ. …"
  7. 7

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
  8. 8
  9. 9

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments حسب Mohammadhasan Faghihi (22303057)

    منشور في 2024
    "…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
  10. 10

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12
  13. 13

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  14. 14

    Stochastic evolution algorithm for technology mapping حسب Al-Mulhem, A.S.

    منشور في 1998
    "…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15
  16. 16

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 17

    Simultaneous stabilization of multimachine power systems viagenetic algorithms حسب Abdel-Magid, Y.L.

    منشور في 1999
    "…The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18
  19. 19

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems حسب Abdel Magid, Y.L.

    منشور في 2020
    "…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …"
    احصل على النص الكامل
    article
  20. 20

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article