Showing 1 - 20 results of 353 for search '(( algorithm both function ) OR ((( algorithm its function ) OR ( algorithm _ function ))))', query time: 0.13s Refine Results
  1. 1
  2. 2

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3
  4. 4
  5. 5

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities by Moinuddin, M.

    Published 2003
    “…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. Moreover, the ability of the adaptive algorithm to track the variations in the environment is shown to degrade with increasing frequency offset.…”
    Get full text
    Get full text
    article
  6. 6

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 7

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems by Abu Zitar, Raed

    Published 2022
    “…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …”
    Get full text
  13. 13

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications by Mohieddine Benammar (18103039)

    Published 2019
    “…The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …”
  14. 14

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods by Abu Zitar, Raed

    Published 2023
    “…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
    Get full text
  15. 15

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 16

    Iterative Least Squares Functional Networks Classifier by Faisal, Kanaan A

    Published 2007
    “…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …”
    Get full text
    Get full text
    article
  17. 17

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  18. 18

    Evolutionary algorithm for protein structure prediction by Mansour, Nashat

    Published 2010
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 19

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…The overlay structure – a unique logical tree – used to control access to the critical section maintains its consistency even when nodes fail. An extensive simulation study demonstrates the viability and efficiency of the proposed algorithm under various node failure models, and relevant metrics (e.g., node queue dimension, number of exchanged messages, and number of disconnected nodes) indicate a graceful degradation in performance with decreasing number of functioning nodes. …”
  20. 20

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
    Get full text
    Get full text
    article