Showing 1 - 20 results of 316 for search '(((( algorithm rate function ) OR ( algorithm based function ))) OR ( algorithm 1 function ))', query time: 0.17s Refine Results
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  2. 2
  3. 3
  4. 4
  5. 5

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
  6. 6

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article
  7. 7

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  8. 8

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
    Get full text
  10. 10
  11. 11

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12
  13. 13

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
    Get full text
    Get full text
    article
  14. 14

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 15

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian integers, Z[i], and polynomials over finite fields, F[x]. We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 16

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm by Abido, M.A.

    Published 1999
    “…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
    Get full text
    Get full text
    article
  17. 17

    A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem by Mantawy, A. H.

    Published 2020
    “…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
    Get full text
    article
  18. 18

    Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms by Abdel-Magid, Y. L.

    Published 2004
    “…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
    Get full text
    article
  19. 19
  20. 20

    Evaluation of transfer functions for punctured turbo codes by Mugaibel, A.H.

    Published 2000
    “…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
    Get full text
    Get full text
    article