بدائل البحث:
algorithm within » algorithm its (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
algorithm within » algorithm its (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
2
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
منشور في 2024"…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …"
-
3
Learning continuous functions using decision tree learning algorithms
منشور في 2001احصل على النص الكامل
masterThesis -
4
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
5
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
6
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
7
Salp swarm algorithm: survey, analysis, and new applications
منشور في 2024"…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …"
احصل على النص الكامل
-
8
-
9
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
منشور في 2017"…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …"
احصل على النص الكامل
article -
10
-
11
-
12
-
13
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013احصل على النص الكامل
doctoralThesis -
14
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
منشور في 2024"…The obtained solution is an optimum offline solution that is used to select one or more sensors for any future flights within the vicinity of the 5 radars. …"
احصل على النص الكامل
-
15
Economic load dispatch using memetic sine cosine algorithm
منشور في 2022"…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …"
احصل على النص الكامل
-
16
From Collatz Conjecture to chaos and hash function
منشور في 2023"…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …"
-
17
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
منشور في 2003"…Optimal multiobjective design of robust multimachine power system stabilizers (PSSs) using genetic algorithms is presented in this paper. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
-
19
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
احصل على النص الكامل
احصل على النص الكامل
-
20
Tracking analysis of normalized adaptive algorithms
منشور في 2003"…A unified approach is carried out using a mixed-norm-type error nonlinearity. Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article