بدائل البحث:
where function » heart function (توسيع البحث)
algorithm cost » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
where function » heart function (توسيع البحث)
algorithm cost » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
-
81
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
منشور في 2023"…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …"
احصل على النص الكامل
-
82
A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder
منشور في 1989"…The systolic algorithm is modeled in AHPL to verify functional correctness. …"
احصل على النص الكامل
احصل على النص الكامل
article -
83
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
84
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
منشور في 2021"…In this paper, a multiswarm-intelligence-based algorithm (MSIA) is developed to cope with bound constrained functions. …"
-
85
A parallel tabu search algorithm for VLSI standard-cell placement
منشور في 2000"…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …"
احصل على النص الكامل
احصل على النص الكامل
article -
86
A comparative study of ElGamal based digital signature algorithms
منشور في 2006"…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
87
Computational evluation of protein energy functions
منشور في 2014"…In this project, we carry out a computational evaluation of putative protein energy functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
88
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
-
89
Random vector functional link network: Recent developments, applications, and future directions
منشور في 2023"…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. RVFL model has several characteristics such as fast training speed, direct links, simple architecture, and universal approximation capability, that make it a viable randomized neural network. …"
-
90
GAP - A GENETIC ALGORITHM APPROACH TO OPTIMIZE 2-BIT DECODER PLAS
منشور في 2020"…This paper describes a minimization procedure that uses a genetic algorithm approach to reduce the size to the two bit decoder PLAs. …"
احصل على النص الكامل
article -
91
A new tabu search algorithm for the long-term hydro scheduling problem
منشور في 2002"…The proposed implementation contributes to the enhancement of speed and convergence of the original tabu search algorithm (TSA). A significant reduction in the objective function over previous classical optimization methods and a simulated annealing algorithm has been achieved. …"
احصل على النص الكامل
احصل على النص الكامل
article -
92
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
93
BUC algorithm for iceberg cubes
منشور في 2003"…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
94
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
95
Evolution Of Activation Functions for Neural Architecture Search
منشور في 2020"…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
96
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
منشور في 1999"…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
97
From Collatz Conjecture to chaos and hash function
منشور في 2023"…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
98
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
منشور في 2020"…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …"
احصل على النص الكامل
article -
99
-
100
Tracking analysis of normalized adaptive algorithms
منشور في 2003"…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…"
احصل على النص الكامل
احصل على النص الكامل
article