Showing 1 - 20 results of 111 for search '(((( algorithm allows function ) OR ( algorithm co function ))) OR ( algorithm both function ))', query time: 0.14s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …”
    Get full text
    Get full text
    article
  6. 6
  7. 7

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  8. 8
  9. 9

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks by Ioannis A. Tsalafoutas (14776939)

    Published 2025
    “…The modulation transfer function (MTF) and the signal‐to‐noise‐ratio (SNR) dependence on exposure conditions and post‐processing algorithms do not always follow the same trends for raw and clinical images and/or different manufacturers, while the signal‐difference‐to‐noise‐ratio (SDNR) and the detectability index (d′), despite their differences, seem more appropriate to characterize IQ. …”
  10. 10
  11. 11
  12. 12

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …”
  13. 13
  14. 14

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
  15. 15

    Iterative Least Squares Functional Networks Classifier by Faisal, Kanaan A

    Published 2007
    “…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …”
    Get full text
    Get full text
    article
  16. 16

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 18

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …”
    Get full text
    Get full text
    article
  19. 19
  20. 20

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject