بدائل البحث:
against function » against infection (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
against function » against infection (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithms a (توسيع البحث), algorithm _ (توسيع البحث)
a function » _ functional (توسيع البحث)
-
1
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …"
-
2
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: احصل على النص الكامل
احصل على النص الكامل
-
3
-
4
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
5
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
منشور في 2023"…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
احصل على النص الكامل
-
6
-
7
-
8
From Collatz Conjecture to chaos and hash function
منشور في 2023"…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
9
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
-
10
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
11
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
منشور في 2022"…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
-
12
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
منشور في 2022"…Therefore, the paper discusses the development of the Lévy flight-based reptile search algorithm with local search capability and evaluates its potential against challenging power systems engineering optimization problems. …"
احصل على النص الكامل
-
13
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013احصل على النص الكامل
doctoralThesis -
14
Metaheuristic Algorithm for State-Based Software Testing
منشور في 2018"…SA evolves a solution by minimizing an energy function that is based on testing objectives such as coverage, diversity, and continuity of events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
15
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
منشور في 2023"…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …"
احصل على النص الكامل
-
16
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
17
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
Economic load dispatch using memetic sine cosine algorithm
منشور في 2022"…SCA is a recent population based optimizer turned towards the optimal solution using a mathematical-based model based on sine and cosine trigonometric functions. …"
احصل على النص الكامل
-
19
A comparative study of RSA based digital signature algorithms
منشور في 2006"…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20