يعرض 1 - 20 نتائج من 349 نتيجة بحث عن '(( algorithm three function ) OR ((( algorithm ai function ) OR ( algorithm a function ))))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 1
  2. 2

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 3
  4. 4

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. …"
    احصل على النص الكامل
    احصل على النص الكامل
  5. 5
  6. 6

    Salp swarm algorithm: survey, analysis, and new applications حسب Abualigah, Laith

    منشور في 2024
    "…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
    احصل على النص الكامل
  7. 7
  8. 8

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems حسب Tabbara, Mazen R.

    منشور في 2017
    "…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9
  10. 10

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 11

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …"
  12. 12

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…This paper proposes unconstrained functional networks as a new classifier to deal with the pattern recognition problems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13
  14. 14

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …"
  15. 15

    A fuzzy basis function network for generator excitation control حسب Abido, M.A.

    منشور في 1997
    "…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16

    Computational evluation of protein energy functions حسب Mansour, Nashat

    منشور في 2014
    "…A protein is characterized by its 3D structure, which defines its biological function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 17

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm حسب Ayman Khallel Al-Ani (17541447)

    منشور في 2023
    "…Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
  18. 18

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 19

    A New Penalty Function Algorithm For Convex Quadratic Programming حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
    احصل على النص الكامل
    article
  20. 20

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"