يعرض 41 - 60 نتائج من 351 نتيجة بحث عن '(( algorithm using function ) OR ((( algorithms within function ) OR ( algorithms a function ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 41

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
  2. 42

    Radial basis function networks for contingency analysis of bulkpower systems حسب Refaee, J.A.

    منشور في 1999
    "…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 43

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 44

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 45

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 46

    BUC algorithm for iceberg cubes حسب Nasr, George E.

    منشور في 2003
    "…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 47

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  8. 48

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques حسب Fares, Samar

    منشور في 2024
    "…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …"
    احصل على النص الكامل
  9. 49

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 50

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 51

    Optimal multiobjective design of robust power system stabilizers using genetic algorithms حسب Abdel-Magid, Y.L.

    منشور في 2003
    "…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 52

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms حسب Abdel-Magid, Y. L.

    منشور في 2004
    "…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    article
  13. 53

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل
  14. 54
  15. 55

    A genetic-based algorithm for fuzzy unit commitment model حسب Mantawy, A.H.

    منشور في 2000
    "…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 56

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 57
  18. 58

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
    احصل على النص الكامل
  19. 59

    Tracking analysis of normalized adaptive algorithms حسب Moinuddin, M.

    منشور في 2003
    "…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 60

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning حسب Sait, Sadiq M.

    منشور في 2006
    "…A series of experiments are performed to evaluate the efficiency of the algorithms. …"
    احصل على النص الكامل
    article