بدائل البحث:
algorithm allows » algorithm aoa (توسيع البحث)
algorithm three » algorithm survey (توسيع البحث)
three function » taste function (توسيع البحث)
algorithm b » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithms _ (توسيع البحث)
b function » _ functional (توسيع البحث)
algorithm allows » algorithm aoa (توسيع البحث)
algorithm three » algorithm survey (توسيع البحث)
three function » taste function (توسيع البحث)
algorithm b » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithms _ (توسيع البحث)
b function » _ functional (توسيع البحث)
-
1
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013الموضوعات: احصل على النص الكامل
doctoralThesis -
2
-
3
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis -
4
New enumeration algorithm for regular boolean functions
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
5
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…Secure Socket Layer (SSL) is a cryptographic protocol widely used to make a secure connection to a Web server. SSL uses three interdependent cryptographic functions to perform a secure connection. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
6
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
7
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…"
احصل على النص الكامل
احصل على النص الكامل
article -
8
A comparative study of RSA based digital signature algorithms
منشور في 2006"…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
9
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
منشور في 2017"…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…Network integration is common in cyber-physical systems (CPS) to allow for remote access, surveillance, and analysis. …"
احصل على النص الكامل
احصل على النص الكامل
-
11
-
12
Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks
منشور في 2025"…<h3>Purpose</h3><p dir="ltr">To evaluate image quality (IQ) of for‐processing (raw) and for‐presentation (clinical) radiography images, under different exposure conditions and digital image post‐processing algorithms, using a phantom that enables multiple detection tasks.…"
-
13
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
14
-
15
-
16
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
منشور في 2024"…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
-
17
-
18
Computational evluation of protein energy functions
منشور في 2014"…A protein is characterized by its 3D structure, which defines its biological function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
19
-
20
Iterative Least Squares Functional Networks Classifier
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
article