يعرض 1 - 20 نتائج من 349 نتيجة بحث عن '(( algorithm against function ) OR ((( algorithm three function ) OR ( algorithm a function ))))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1
  2. 2
  3. 3

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  5. 5

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control حسب Abu Zitar, Raed

    منشور في 2022
    "…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …"
  6. 6

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …"
    احصل على النص الكامل
  7. 7

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  8. 8
  9. 9

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
  10. 10

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 11
  12. 12

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications حسب Mohieddine Benammar (18103039)

    منشور في 2019
    "…The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …"
  13. 13

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …"
  15. 15

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…This paper proposes unconstrained functional networks as a new classifier to deal with the pattern recognition problems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16
  17. 17

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …"
  18. 18

    A fuzzy basis function network for generator excitation control حسب Abido, M.A.

    منشور في 1997
    "…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…A protein is characterized by its 3D structure, which defines its biological function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 20

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject