يعرض 281 - 300 نتائج من 348 نتيجة بحث عن '(( algorithm fa function ) OR ((( algorithm sma function ) OR ( algorithm a function ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 281

    Fixed set search applied to the multi-objective minimum weighted vertex cover problem حسب Raka Jovanovic (17947838)

    منشور في 2022
    "…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …"
  2. 282

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators حسب I.S. Elkamash (16810689)

    منشور في 2023
    "…Besides, in literature, we barely can find a resummation algorithm for which the convergence is faster for stronglydivergent ( Gevrey − k , k > 1) series than a divergent one ( Gevrey − 1 ). …"
  3. 283

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
  4. 284
  5. 285

    Power matching approach for GPS coverage extension حسب Saab, Samer S.

    منشور في 2006
    "…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 286

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network حسب Monzure-Khoda Kazi (17191207)

    منشور في 2024
    "…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …"
  7. 287
  8. 288

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms حسب Ezzine, J.

    منشور في 1995
    "…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 289

    Iterative heuristics for multiobjective VLSI standard cellplacement حسب Sait, Sadiq M.

    منشور في 2001
    "…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 290

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING حسب Sait, Sadiq M.

    منشور في 2020
    "…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…"
    احصل على النص الكامل
    article
  11. 291

    General iterative heuristics for VLSI multiobjective partitioning حسب Sait, Sadiq M.

    منشور في 2003
    "…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 292

    Design and development of an embedded controller for roboticmanipulator حسب Bakhashwain, J.M.

    منشور في 1998
    "…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 293

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 294

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT حسب Sait, Sadiq M.

    منشور في 2006
    "…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …"
    احصل على النص الكامل
    article
  15. 295
  16. 296

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 297

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics حسب Naila Rabbani (291722)

    منشور في 2022
    "…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …"
  18. 298

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 299

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 300

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem حسب Assaker, Guy

    منشور في 2016
    "…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article