Showing 1 - 20 results of 348 for search '(((( algorithm allows functional ) OR ( algorithm a function ))) OR ( algorithm python function ))', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …”
    Get full text
    Get full text
    article
  4. 4

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  5. 5

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 6

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
    Get full text
    Get full text
    article
  7. 7

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  8. 8

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…A digital signature is a mechanism designed to allow secure communication through an insecure medium and can be traced in many applications where privacy is required. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 10

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm by Zerguine, A.

    Published 2000
    “…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
    Get full text
    Get full text
    article
  12. 12

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  13. 13

    Simultaneous stabilization of multimachine power systems viagenetic algorithms by Abdel-Magid, Y.L.

    Published 1999
    “…The power system operating at various conditions is treated as a finite set of plants. The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …”
    Get full text
    Get full text
    article
  14. 14

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  15. 15

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. …”
    Get full text
    article
  16. 16

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 17

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  18. 18

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks by Ioannis A. Tsalafoutas (14776939)

    Published 2025
    “…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…”
  19. 19

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  20. 20

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm by De Rochechouart, Maxence

    Published 2023
    “…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
    Get full text