يعرض 1 - 20 نتائج من 352 نتيجة بحث عن '(( algorithm i function ) OR ( ((algorithm a) OR (algorithm using)) function ))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    A New Penalty Function Algorithm For Convex Quadratic Programming حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
    احصل على النص الكامل
    article
  3. 3
  4. 4

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 5
  6. 6

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  7. 7
  8. 8
  9. 9

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …"
  10. 10

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) حسب AlHamaydeh, Mohammad

    منشور في 2017
    "…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …"
    احصل على النص الكامل
    article
  11. 11

    A new reactive power optimization algorithm حسب Mantawy, A.H.

    منشور في 2003
    "…This paper presents an algorithm for optimizing reactive power using particle swarm algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
  13. 13

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …"
    احصل على النص الكامل
  14. 14

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 16

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …"
    احصل على النص الكامل
    article
  18. 18

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. …"
    احصل على النص الكامل
    article
  19. 19

    Tracking analysis of normalized adaptive algorithms حسب Moinuddin, M.

    منشور في 2003
    "…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20