يعرض 121 - 140 نتائج من 351 نتيجة بحث عن '(((( algorithm a function ) OR ( algorithms a function ))) OR ( algorithm using function ))', وقت الاستعلام: 0.20s تنقيح النتائج
  1. 121

    A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder حسب Sait, Sadiq M.

    منشور في 1989
    "…The systolic algorithm is modeled in AHPL to verify functional correctness. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 122

    Minimizing using BBO and DFO methods حسب El Zeghondy, Jean

    منشور في 2022
    "…In order to apply this algorithm to real life problems, two numerical methods need to be developed: A numerical method to solve nonlinear differential equations, and a numerical method to nd the minimum of an objective function (given only numerically) in fi nite dimensional spaces. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 123

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm حسب Zerguine, A.

    منشور في 2000
    "…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 124
  5. 125

    A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems حسب Kandil, Sarah M.

    منشور في 2017
    "…The formulation employs a general objective function that optimizes the total Annual Cost of Energy (ACOE). …"
    احصل على النص الكامل
    article
  6. 126

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  7. 127

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash حسب Ilias K. Nikolaidis (9217172)

    منشور في 2022
    "…The calculations are performed with the electrolyte Statistical Associating Fluid Theory with the Mie potential of variable range (eSAFT-VR Mie) equation of state but the proposed methods are general and could be used with any other thermodynamic model.</p><h2>Other Information</h2><p dir="ltr">Published in: Fluid Phase Equilibria<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.fluid.2022.113441" target="_blank">https://dx.doi.org/10.1016/j.fluid.2022.113441</a></p>…"
  8. 128

    GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design حسب Sait, Sadiq M.

    منشور في 2020
    "…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …"
    احصل على النص الكامل
    article
  9. 129

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 130
  11. 131
  12. 132
  13. 133

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…It was found that SVM using radial basis function (RBF) kernel achieved the highest performance with an accuracy of 99.5%. …"
    احصل على النص الكامل
    article
  14. 134
  15. 135
  16. 136
  17. 137

    An improved kernelization algorithm for r-Set Packing حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…Such parameterized reductions are known as kernelization algorithms, and a reduced instance is called a problem kernel. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 138

    Scatter Search algorithm for Protein Structure Prediction حسب Mansour, Nashat

    منشور في 2016
    "…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 139

    LINE SEARCH TECHNIQUES FOR THE LOGARITHMIC BARRIER FUNCTION IN QUADRATIC-PROGRAMMING حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we propose a line-search procedure for the logarithmic barrier function in the context of an interior point algorithm for convex quadratic programming. …"
    احصل على النص الكامل
    article
  20. 140

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems حسب Agushaka, Jeffrey O.

    منشور في 2022
    "…This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. …"
    احصل على النص الكامل