Search alternatives:
algorithm rate » algorithm fa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
based function » taste function (Expand Search)
rate function » taste function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm rate » algorithm fa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
based function » taste function (Expand Search)
rate function » taste function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
1
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: Get full text
Get full text
-
2
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
3
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
4
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
5
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
-
6
-
7
-
8
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
9
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
10
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder
Published 1989“…The systolic algorithm is modeled in AHPL to verify functional correctness. …”
Get full text
Get full text
article -
12
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …”
-
13
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
14
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…SA evolves a solution by minimizing an energy function that is based on testing objectives such as coverage, diversity, and continuity of events. …”
Get full text
Get full text
Get full text
Get full text
article -
15
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
16
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
Get full text
Get full text
article -
17
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…SCA is a recent population based optimizer turned towards the optimal solution using a mathematical-based model based on sine and cosine trigonometric functions. …”
Get full text
-
18
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
19
-
20
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article