Search alternatives:
algorithm allows » algorithm aoa (Expand Search)
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
algorithm allows » algorithm aoa (Expand Search)
algorithm time » algorithm its (Expand Search), algorithm sma (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
-
1
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
2
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
4
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
5
-
6
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
-
7
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
8
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
9
Convergence analysis of the variable weight mixed-norm LMS-LMFadaptive algorithm
Published 2000“…In this work, the convergence analysis of the variable weight mixed-norm LMS-LMF (least mean squares-least mean fourth) adaptive algorithm is derived. The proposed algorithm minimizes an objective function defined as a weighted sum of the LMS and LMF cost functions where the weighting factor is time varying and adapts itself so as to allow the algorithm to keep track of the variations in the environment. …”
Get full text
Get full text
article -
10
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. …”
-
11
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
12
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article -
13
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
-
14
Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks
Published 2025“…The modulation transfer function (MTF) and the signal‐to‐noise‐ratio (SNR) dependence on exposure conditions and post‐processing algorithms do not always follow the same trends for raw and clinical images and/or different manufacturers, while the signal‐difference‐to‐noise‐ratio (SDNR) and the detectability index (d′), despite their differences, seem more appropriate to characterize IQ. …”
-
15
-
16
-
17
-
18
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
19
-
20