يعرض 1 - 20 نتائج من 353 نتيجة بحث عن '(( algorithm _i function ) OR ( algorithm _ function ))*', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…None of these algorithms provides absolute optimum results for synthesis of these functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4
  5. 5
  6. 6

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…Compared to those with wild type, carriers of reduced function alleles in <i>CYP2C9</i> required significantly lower median (IQR) warfarin weekly dose [24.5 (15.3) vs. 35 (29.8) mg/week, p=0.006]. …"
  7. 7

    Evolutionary algorithm for predicting all-atom protein structure حسب Mansour, Nashat

    منشور في 2011
    "…This algorithm produces a 3D structure of the whole protein, including back-bone and side-chain atoms, by minimizing the energy function associated with the structure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9
  10. 10

    A New Penalty Function Algorithm For Convex Quadratic Programming حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
    احصل على النص الكامل
    article
  11. 11

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …"
    احصل على النص الكامل
    article
  12. 12

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …"
    احصل على النص الكامل
  14. 14

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
  15. 15

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…It should be noted that, except EBCM, the other 10 new algorithms are inferior to the 4 state-of-the-art algorithms in terms of convergence speed and global search ability on CEC 2017 functions. …"
  17. 17

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
  18. 18
  19. 19

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 20

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
    احصل على النص الكامل