Showing 1 - 20 results of 353 for search '(( algorithm fa function ) OR ( algorithm ((a function) OR (_ functional)) ))', query time: 0.11s Refine Results
  1. 1

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  2. 2
  3. 3

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  5. 5

    Iterative Least Squares Functional Networks Classifier by Faisal, Kanaan A

    Published 2007
    “…This paper proposes unconstrained functional networks as a new classifier to deal with the pattern recognition problems. …”
    Get full text
    Get full text
    article
  6. 6

    Evaluation of transfer functions for punctured turbo codes by Mugaibel, A.H.

    Published 2000
    “…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
    Get full text
    Get full text
    article
  7. 7
  8. 8

    A Stochastic Newton-Raphson Method with Noisy Function Measurements by Saab, Khaled Kamal

    Published 2016
    “…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 9

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
    Get full text
    Get full text
    article
  10. 10

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Proteins are organic compounds made up of chains of amino acids that fold into complex 3-dimensional structures based on their chemical and physical properties. A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11
  12. 12

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 18

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  20. 20