Search alternatives:
algorithm rate » algorithm fa (Expand Search), algorithm a (Expand Search), algorithm aoa (Expand Search)
based function » taste function (Expand Search)
rate function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
algorithm rate » algorithm fa (Expand Search), algorithm a (Expand Search), algorithm aoa (Expand Search)
based function » taste function (Expand Search)
rate function » taste function (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
2
A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder
Published 1989Get full text
Get full text
article -
3
-
4
-
5
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
-
6
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
7
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
8
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
Get full text
-
10
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: Get full text
Get full text
-
11
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020Get full text
article -
13
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
Get full text
Get full text
article -
14
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
15
A comparative study of ElGamal based digital signature algorithms
Published 2006“…ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. …”
Get full text
Get full text
Get full text
Get full text
article -
16
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
Published 1999“…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
Get full text
Get full text
article -
17
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
Get full text
article -
18
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
Published 2004“…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
Get full text
article -
19
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
20
Evaluation of transfer functions for punctured turbo codes
Published 2000“…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
Get full text
Get full text
article