Showing 1 - 20 results of 125 for search '(((( algorithm co function ) OR ( algorithm time function ))) OR ( algorithm python function ))', query time: 0.14s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications by Mohieddine Benammar (18103039)

    Published 2019
    “…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …”
  5. 5

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures by Leduc, Guillaume

    Published 2025
    “…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
    Get full text
    article
  6. 6

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm by Abdelbasset Krama (16870008)

    Published 2018
    “…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
  14. 14

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  15. 15

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 16

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17

    Timing influenced general-cell genetic floorplanner by Sait, Sadiq M.

    Published 2020
    “…The approach combines the robustness of genetic algorithm with run time efficiency and elegance of constraint graph based method. …”
    Get full text
    article
  18. 18
  19. 19

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
    Get full text
    Get full text
    article
  20. 20

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject