يعرض 1 - 20 نتائج من 341 نتيجة بحث عن '(((( algorithm i function ) OR ( algorithm using function ))) OR ( algorithm from function ))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4
  5. 5

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6
  7. 7

    A New Penalty Function Algorithm For Convex Quadratic Programming حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
    احصل على النص الكامل
    article
  8. 8

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…</p><h3>Results</h3><p dir="ltr">The study enrolled 130 patients from 12 Arabian countries. Compared to those with wild type, carriers of reduced function alleles in <i>CYP2C9</i> required significantly lower median (IQR) warfarin weekly dose [24.5 (15.3) vs. 35 (29.8) mg/week, p=0.006]. …"
  9. 9
  10. 10

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems حسب Abualigah, Laith

    منشور في 2023
    "…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
    احصل على النص الكامل
  11. 11

    Evolution Of Activation Functions for Neural Architecture Search حسب Nader, Andrew

    منشور في 2020
    "…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 12
  13. 13

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning حسب Sait, Sadiq M.

    منشور في 2006
    "…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …"
    احصل على النص الكامل
    article
  14. 14
  15. 15

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We have suggested the SFL-HMM together with HMS-ACO process as a method used for detection of the cyber attacks. A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
  16. 16

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control حسب Abu Zitar, Raed

    منشور في 2022
    "…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …"
  17. 17

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  18. 18

    Evolutionary algorithm for predicting all-atom protein structure حسب Mansour, Nashat

    منشور في 2011
    "…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 19

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 20

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…A fitness function is constructed from the total operating cost of the generating units without penalty terms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article