Showing 121 - 140 results of 351 for search '((algorithms a) OR (algorithm using)) function', query time: 0.10s Refine Results
  1. 121

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
    Get full text
    Get full text
    article
  2. 122

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm by Abdelbasset Krama (16870008)

    Published 2018
    “…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. …”
  3. 123

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…One way to dynamically discover and route traffic to service instances is to use a service discovery tool to locate the Internet Protocol (IP) address and port number of a microservice. …”
  4. 124

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…SSL uses three interdependent cryptographic functions to perform a secure connection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 125

    A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder by Sait, Sadiq M.

    Published 1989
    “…The systolic algorithm is modeled in AHPL to verify functional correctness. …”
    Get full text
    Get full text
    article
  6. 126

    A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation by Iman M. Hosseini Naveh (16891482)

    Published 2021
    “…The virtual inertia-based HVDC model, which is using a derivative technique, is attached for enhancing the system frequency dynamics with fast power injection during the contingency. …”
  7. 127

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm by Zerguine, A.

    Published 2000
    “…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
    Get full text
    Get full text
    article
  8. 128

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
  9. 129

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…In this project, we carry out a computational evaluation of putative protein energy functions. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 130
  11. 131

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…Finally, we present potential future research directions/opportunities that can inspire the researchers to improve the RVFL’s architecture and learning algorithm further. </p> <h2>Other Information</h2> <p>Published in: Applied Soft Computing<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/ </a> <br> See article on publisher's website: <a href="http://dx.doi.org/10.1016/j.asoc.2023.110377" target="_blank">http://dx.doi.org/10.1016/j.asoc.2023.110377</a> </p>…”
  12. 132

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 133

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The ANN is implemented using the cross entropy error function in the training stage. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 134

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  15. 135

    GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design by Sait, Sadiq M.

    Published 2020
    “…This paper addresses the optimization of cell placement step in VLSI circuit design [1]. A novel hybrid algorithm is proposed for performance and low power driven VLSI standard cell placement. …”
    Get full text
    article
  16. 136

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article
  17. 137
  18. 138

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  19. 139
  20. 140

    An improved kernelization algorithm for r-Set Packing by Abu-Khzam, Faisal N.

    Published 2010
    “…Such parameterized reductions are known as kernelization algorithms, and a reduced instance is called a problem kernel. …”
    Get full text
    Get full text
    Get full text
    article