Search alternatives:
using function » using fusion (Expand Search)
phase function » taste function (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
using function » using fusion (Expand Search)
phase function » taste function (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
-
1
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
2
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
3
Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm
Published 1999“…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
Get full text
Get full text
article -
4
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
5
Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash
Published 2022“…<p dir="ltr">New algorithms for vapor – liquid (VLE) and liquid - liquid (LLE) equilibrium calculations at constant temperature, pressure and feed phase composition (PT flash), with application to mixtures containing fully dissociating electrolytes are presented. …”
-
6
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
7
Learning continuous functions using decision tree learning algorithms
Published 2001Get full text
masterThesis -
8
Computational evluation of protein energy functions
Published 2014“…However, the energy functions proposed so far by biophysicists and biochemists are still in the exploration phase and their usefulness has been demonstrated only individually. …”
Get full text
Get full text
Get full text
conferenceObject -
9
-
10
New enumeration algorithm for regular boolean functions
Published 2018“…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
-
12
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
13
-
14
-
15
A comparative study of RSA based digital signature algorithms
Published 2006“…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
16
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
17
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
Get full text
article -
18
-
19
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
20
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text