Showing 1 - 20 results of 298 for search '(( algorithm python function ) OR ((( algorithm used function ) OR ( algorithm allows function ))))', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 6

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  7. 7

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8
  9. 9

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The first function is authentication. It is used to allow the client to identify the server and optionally allow the server to identify the client. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    Simultaneous stabilization of multimachine power systems viagenetic algorithms by Abdel-Magid, Y.L.

    Published 1999
    “…This paper demonstrates the use of genetic algorithms for the simultaneous stabilization of multimachine power systems over a wide range of operating conditions via single-setting power system stabilizers. …”
    Get full text
    Get full text
    article
  11. 11

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  12. 12

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  13. 13

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks by Ioannis A. Tsalafoutas (14776939)

    Published 2025
    “…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…”
  14. 14
  15. 15
  16. 16

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
    Get full text
    article
  17. 17

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 18

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  20. 20

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text