Showing 1 - 20 results of 276 for search '(((( algorithm based function ) OR ( algorithm cl function ))) OR ( algorithm which function ))', query time: 0.14s Refine Results
  1. 1

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  2. 2

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …”
  3. 3
  4. 4

    Metaheuristic Algorithm for State-Based Software Testing by Haraty, Ramzi A.

    Published 2018
    “…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 5

    Belief selection in point-based planning algorithms for POMDPs by Azar, Danielle

    Published 2017
    “…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 6

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 7

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
    Get full text
    article
  8. 8

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 9

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…A protein is characterized by its 3D structure, which defines its biological function. Proteins fold into 3D structures in a way that leads to low-energy state. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10
  11. 11

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem by Mantawy, A. H.

    Published 2020
    “…The proposed algorithm, which is mainly based on genetic algorithms incorporates tabu search method to generate new population members in the reproduction phase of the genetic algorithm. …”
    Get full text
    article
  12. 12
  13. 13

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  14. 14

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. …”
    Get full text
    Get full text
    article
  16. 16

    Evolutionary algorithm for protein structure prediction by Mansour, Nashat

    Published 2010
    “…A protein is characterized by its 3D structure, which defines its biological function. The protein structure prediction problem has real-world significance where several diseases are associated with the wrong folding of proteins. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning by Sait, Sadiq M.

    Published 2006
    “…Further, we compared the results of the iterative heuristics with a modified FM algorithm, named PowerFM, which targets power optimization. …”
    Get full text
    article
  18. 18

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  19. 19
  20. 20

    Simultaneous stabilization of multimachine power systems viagenetic algorithms by Abdel-Magid, Y.L.

    Published 1999
    “…The problem of selecting the parameters of power system stabilizers which simultaneously stabilize this set of plants is converted to a simple optimization problem which is solved by a genetic algorithm with an eigenvalue-based objective function. …”
    Get full text
    Get full text
    article