يعرض 1 - 20 نتائج من 127 نتيجة بحث عن '(( algorithm ((both function) OR (most function)) ) OR ( algorithms adopted function ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1
  2. 2

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…A comparative study with the most common classification algorithms in both machine learning and statistics communities is carried out. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
    احصل على النص الكامل
  5. 5
  6. 6

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
  7. 7
  8. 8

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  9. 9
  10. 10

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation حسب Said Mahfoud (17150968)

    منشور في 2022
    "…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). The proposed approach is implemented on Matlab/Simulink to validate the objectives adopted by this strategy. …"
  11. 11

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments حسب Mohammadhasan Faghihi (22303057)

    منشور في 2024
    "…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
  12. 12

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…Drawing on the Behavioral Reasoning Theory (BRT), the paper establishes relationships between the enablers and inhibitors on the adoption intention of voice assistants. To examine the hypothesized relationship, a quantitative approach employing PLS-SEM was utilized to evaluate a representative sample of 1189 Indian consumers and examining the psychological and functional constructs leading to adoption intention for voice assistants. …"
  13. 13

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 15

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  16. 16
  17. 17
  18. 18

    Radial basis function networks for contingency analysis of bulkpower systems حسب Refaee, J.A.

    منشور في 1999
    "…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Belief selection in point-based planning algorithms for POMDPs حسب Azar, Danielle

    منشور في 2017
    "…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 20

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject