Showing 41 - 60 results of 348 for search '(((( algorithm a function ) OR ( algorithm fa function ))) OR ( algorithm aoa function ))', query time: 0.13s Refine Results
  1. 41

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm by Zerguine, A.

    Published 2000
    “…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
    Get full text
    Get full text
    article
  2. 42
  3. 43

    A parallel tabu search algorithm for VLSI standard-cell placement by Suit, S.M.

    Published 2000
    “…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
    Get full text
    Get full text
    article
  4. 44

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 45

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…In this project, we carry out a computational evaluation of putative protein energy functions. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 46

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  7. 47

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. RVFL model has several characteristics such as fast training speed, direct links, simple architecture, and universal approximation capability, that make it a viable randomized neural network. …”
  8. 48

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem by Mantawy, A.H.

    Published 1999
    “…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
    Get full text
    Get full text
    article
  9. 49

    GAP - A GENETIC ALGORITHM APPROACH TO OPTIMIZE 2-BIT DECODER PLAS by Benten, M. S.

    Published 2020
    “…This paper describes a minimization procedure that uses a genetic algorithm approach to reduce the size to the two bit decoder PLAs. …”
    Get full text
    article
  10. 50

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem by Mantawy, A. H.

    Published 2020
    “…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
    Get full text
    article
  11. 51

    A new tabu search algorithm for the long-term hydro scheduling problem by Mantawy, A.H.

    Published 2002
    “…The proposed implementation contributes to the enhancement of speed and convergence of the original tabu search algorithm (TSA). A significant reduction in the objective function over previous classical optimization methods and a simulated annealing algorithm has been achieved. …”
    Get full text
    Get full text
    article
  12. 52
  13. 53
  14. 54
  15. 55

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 56

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 57

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 58

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm by Abido, M.A.

    Published 1999
    “…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
    Get full text
    Get full text
    article
  19. 59

    Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem by Montawy, A.H.

    Published 2020
    “…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
    Get full text
    article
  20. 60

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”