يعرض 1 - 20 نتائج من 315 نتيجة بحث عن '(((( algorithm based function ) OR ( algorithm 1 function ))) OR ( algorithm where function ))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
  3. 3
  4. 4
  5. 5

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Evolutionary algorithm for protein structure prediction حسب Mansour, Nashat

    منشور في 2010
    "…A protein is characterized by its 3D structure, which defines its biological function. The protein structure prediction problem has real-world significance where several diseases are associated with the wrong folding of proteins. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 7

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8
  9. 9

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  10. 10
  11. 11

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12
  13. 13

    A genetic-based algorithm for fuzzy unit commitment model حسب Mantawy, A.H.

    منشور في 2000
    "…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 14

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm حسب Abido, M.A.

    منشور في 1999
    "…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem حسب Mantawy, A. H.

    منشور في 2020
    "…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …"
    احصل على النص الكامل
    article
  17. 17

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms حسب Abdel-Magid, Y. L.

    منشور في 2004
    "…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …"
    احصل على النص الكامل
    article
  18. 18
  19. 19
  20. 20

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject