Search Results - (( evolution activation function algorithm ) OR ( code application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- evolution activation »
- function algorithm »
- code application »
-
1
-
2
-
3
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
4
PID controller design for a twin rotor MIMO system using real coded GA optimisation
Published 2009Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
Get full text
Get full text
Thesis -
7
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Codebook excited linear predictive coding
Published 2011Get full text
Get full text
Get full text
Book Chapter -
9
An improved grey wolf with whale algorithm for optimization functions
Published 2022“…The performance of the proposed algorithm is tested and evaluated on five benchmarked unimodal and five multimodal functions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of CAD/CAM System for Cold Working Closed Die Forging Process
Published 2000“…In the second stage, a finite element analysis and optimisation algorithm was developed to examine the die fatigue life and to optimise the die design. …”
Get full text
Get full text
Thesis -
11
-
12
Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images
Published 2022“…Next, the adaptive initial contour (AIC), δ, and stopping function were integrated to create the adaptive Chan-Vese active contour (ACVAC) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Artificial immune network model based controller for vibration suppression of flexible structures
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
14
Dynamic smart grid communication parameters based cognitive radio network
Published 2023“…The proposed system helps to drive optimal communication parameters to realize power saving, maximum throughput and minimum bit error rate communication modes. A differential evolution algorithm is used to select the optimal transmission parameters for given communication modes based on a fitness function that combines multiple objectives based on appropriate weights. …”
Article -
15
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
Get full text
Get full text
Thesis -
16
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
20
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…Its performances in term of Peak Signal-to-Noise (PSNR), compression ratio and coding gain is proved to be best approximation to the DCT algorithm. …”
Get full text
Get full text
Thesis
