بدائل البحث:
where function » heart function (توسيع البحث)
يعرض 1 - 20 نتائج من 55 نتيجة بحث عن '(( algorithm ((hardening function) OR (python function)) ) OR ( algorithm where function ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 1

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 3

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
  5. 5

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  6. 6

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) حسب AlHamaydeh, Mohammad

    منشور في 2017
    "…The two versions of the optimization problem are nonlinearly constrained where the objective function is the material weight of the supporting truss. …"
    احصل على النص الكامل
    article
  7. 7

    Evolutionary algorithm for protein structure prediction حسب Mansour, Nashat

    منشور في 2010
    "…A protein is characterized by its 3D structure, which defines its biological function. The protein structure prediction problem has real-world significance where several diseases are associated with the wrong folding of proteins. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8
  9. 9

    An improved kernelization algorithm for r-Set Packing حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…We present a reduction procedure that takes an arbitrary instance of the r -Set Packing problem and produces an equivalent instance whose number of elements is in O(kr−1), where k is the input parameter. Such parameterized reductions are known as kernelization algorithms, and a reduced instance is called a problem kernel. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 10
  11. 11

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study حسب Youssef, H.

    منشور في 2020
    "…Abstract Evolutionary algorithms, simulated annealing (SA), and tabu search (TS) are general iterative algorithms for combinatorial optimization. …"
    احصل على النص الكامل
    article
  13. 13

    Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm حسب Zerguine, A.

    منشور في 2000
    "…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 14

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …"
  15. 15
  16. 16
  17. 17

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation حسب Said Mahfoud (17150968)

    منشور في 2022
    "…The best solutions adopted in this situation are often based on optimization algorithms that generate the controller’s gains in each period where there is an internal or external perturbation, adapting the behaviors of the PID against the system’s nonlinearity. …"
  18. 18

    Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems حسب Agushaka, Jeffrey O.

    منشور في 2022
    "…This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. …"
    احصل على النص الكامل
  19. 19
  20. 20