Search alternatives:
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
-
281
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …”
-
282
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
Published 2023“…Besides, in literature, we barely can find a resummation algorithm for which the convergence is faster for stronglydivergent ( Gevrey − k , k > 1) series than a divergent one ( Gevrey − 1 ). …”
-
283
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
284
-
285
Power matching approach for GPS coverage extension
Published 2006“…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
286
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
-
287
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
288
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
Get full text
Get full text
article -
289
Iterative heuristics for multiobjective VLSI standard cellplacement
Published 2001“…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …”
Get full text
Get full text
article -
290
EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING
Published 2020“…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…”
Get full text
article -
291
General iterative heuristics for VLSI multiobjective partitioning
Published 2003“…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
Get full text
Get full text
article -
292
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
293
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
294
FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT
Published 2006“…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
Get full text
article -
295
-
296
Design of adaptive arrays based on element position perturbations
Published 1993“…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
Get full text
Get full text
article -
297
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …”
-
298
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
299
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
300
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article