Search alternatives:
protein function » protein glycation (Expand Search)
based function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
protein function » protein glycation (Expand Search)
based function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
2
Evolutionary algorithm for protein structure prediction
Published 2010“…In this paper, we present an improved genetic algorithm (GA) for predicting 3D structures of proteins based on the hydrophobic polar model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
Computational evluation of protein energy functions
Published 2014“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
conferenceObject -
4
-
5
-
6
-
7
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
-
8
Scatter Search algorithm for Protein Structure Prediction
Published 2016“…In this paper, we present a Scatter Search (SS) algorithm for predicting 3D structures of proteins based on torsion angles representation. …”
Get full text
Get full text
Get full text
article -
9
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
10
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…This algorithm produces a 3D structure of the whole protein, including back-bone and side-chain atoms, by minimizing the energy function associated with the structure. …”
Get full text
Get full text
Get full text
conferenceObject -
11
-
12
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: Get full text
Get full text
-
14
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
15
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020Get full text
article -
16
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
Get full text
Get full text
article -
17
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
18
A comparative study of ElGamal based digital signature algorithms
Published 2006“…ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. …”
Get full text
Get full text
Get full text
Get full text
article -
19
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
Published 1999“…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
Get full text
Get full text
article -
20
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
Get full text
article