Showing 1 - 20 results of 169 for search '(((( algorithm three function ) OR ( algorithm its function ))) OR ( algorithm etc function ))', query time: 0.15s Refine Results
  1. 1
  2. 2

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…Secure Socket Layer (SSL) is a cryptographic protocol widely used to make a secure connection to a Web server. SSL uses three interdependent cryptographic functions to perform a secure connection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4
  5. 5

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  6. 6

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  7. 7

    Evolutionary algorithm for protein structure prediction by Mansour, Nashat

    Published 2010
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8
  9. 9

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper. …”
    Get full text
    Get full text
    article
  10. 10

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…”
    Get full text
    Get full text
    article
  11. 11
  12. 12

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…The results show that the performance of the SCA-βHC algorithm is increased by tuning its parameters in proper value. …”
    Get full text
  13. 13

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  14. 14

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems by Tabbara, Mazen R.

    Published 2017
    “…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications by Mohieddine Benammar (18103039)

    Published 2019
    “…This paper presents a novel technique that combines the advantages of both rational formulae and LUT approximation methods. The new algorithm exploits the pseudo-linear region around the tangent function zero point to estimate a reduced input arctangent through a modified rational approximation before referring this estimate to its original value using miniature LUTs. …”
  16. 16

    Single channel speech denoising by DDPG reinforcement learning agent by Sania Gul (18272227)

    Published 2025
    “…<p dir="ltr">Speech denoising (SD) covers the algorithms that suppress the background noise from the contaminated speech and improve its clarity. …”
  17. 17

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods by Abu Zitar, Raed

    Published 2023
    “…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
    Get full text
  18. 18

    Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering by Abu Zitar, Raed

    Published 2022
    “…To evaluate the AAOA, we implemented extensive experiments using twenty-three well-known benchmark functions and eight data clustering datasets. …”
  19. 19

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
  20. 20