يعرض 1 - 20 نتائج من 52 نتيجة بحث عن '(( algorithm python function ) OR ( ((algorithm allows) OR (algorithm flow)) functional ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  2. 2

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
  3. 3
  4. 4
  5. 5
  6. 6

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  7. 7

    Stochastic evolution algorithm for technology mapping حسب Al-Mulhem, A.S.

    منشور في 1998
    "…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8

    Radial basis function networks for contingency analysis of bulkpower systems حسب Refaee, J.A.

    منشور في 1999
    "…The performance of the RBFN is compared with a standard AC load flow algorithm…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  11. 11

    Simultaneous stabilization of multimachine power systems viagenetic algorithms حسب Abdel-Magid, Y.L.

    منشور في 1999
    "…The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    New fault models and efficient BIST algorithms for dual-portmemories حسب Amin, A.A.

    منشور في 1997
    "…New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems حسب Abdel Magid, Y.L.

    منشور في 2020
    "…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …"
    احصل على النص الكامل
    article
  14. 14

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) حسب Lamaa, Karine H.

    منشور في 2018
    "…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 16

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm حسب Zerguine, A.

    منشور في 2000
    "…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…Network integration is common in cyber-physical systems (CPS) to allow for remote access, surveillance, and analysis. …"
    احصل على النص الكامل
    احصل على النص الكامل
  18. 18

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"