Search alternatives:
algorithm basis » algorithm analysis (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
algorithm basis » algorithm analysis (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
-
1
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
2
A fuzzy basis function network for generator excitation control
Published 1997“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
Get full text
Get full text
article -
3
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. …”
-
4
-
5
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
6
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
7
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
8
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
9
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
10
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …”
-
11
-
12
-
13
-
14
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
15
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
-
16
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …”
-
17
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
18
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
19
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
20
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…The problem of partitioning appears in several areas ranging from VLSI, parallel programming, to molecular biology. …”
Get full text
article