بدائل البحث:
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm both » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
both function » cost function (توسيع البحث)
algorithm from » algorithm fa (توسيع البحث), algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث)
based function » taste function (توسيع البحث)
algorithm both » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
both function » cost function (توسيع البحث)
-
1
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
-
2
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
منشور في 2023"…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
احصل على النص الكامل
-
3
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …"
-
4
-
5
-
6
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
-
7
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
8
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: احصل على النص الكامل
احصل على النص الكامل
-
10
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…The local search operator employs a single insertion approach, while the acceptance–rejection criteria are based on a constant temperature. Parameters of both ES and IG algorithms are calibrated using the Multifactor analysis of variance technique. …"
-
11
-
12
Belief selection in point-based planning algorithms for POMDPs
منشور في 2017"…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
-
15
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
منشور في 2024"…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. …"
-
16
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
17
-
18
A comparative study of RSA based digital signature algorithms
منشور في 2006"…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
A comparative study of ElGamal based digital signature algorithms
منشور في 2006"…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20