Showing 1 - 20 results of 47 for search '(((( algorithm fc function ) OR ( algorithm allows function ))) OR ( algorithm brain function ))', query time: 0.15s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation by Raveendra Pilli (21633287)

    Published 2024
    “…Effective and reliable assessment methods are required to accurately classify and estimate brain age. In this study, a brain age classification and estimation framework is proposed using structural magnetic resonance imaging (sMRI) scans, a 3-D convolutional neural network (3-D-CNN), and a kernel ridge regression-based random vector functional link (KRR-RVFL) network. …”
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 11

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…Earlier diagnosis of ASD from brain image is necessary for reducing the effect of disorder. …”
    Get full text
    Get full text
  12. 12

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …”
    Get full text
    Get full text
    article
  13. 13

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 14

    Simultaneous stabilization of multimachine power systems viagenetic algorithms by Abdel-Magid, Y.L.

    Published 1999
    “…The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …”
    Get full text
    Get full text
    article
  15. 15

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
    Get full text
    article
  16. 16

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
    Get full text
    Get full text
    article
  17. 17

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 18
  19. 19

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 20

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”