Showing 1 - 20 results of 301 for search '(((( algorithm using function ) OR ( algorithm phase function ))) OR ( algorithm b function ))', query time: 0.14s Refine Results
  1. 1

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  2. 2
  3. 3

    Thyristor controlled phase shifter based stabilizer design usingsimulated annealing algorithm by Abido, M.A.

    Published 1999
    “…This paper presents a thyristor controlled phase shifter (TCPS) based stabilizer design using the simulated annealing (SA) algorithm. …”
    Get full text
    Get full text
    article
  4. 4

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  5. 5

    Rigorous Phase Equilibrium Calculation Methods for Strong Electrolyte Solutions: The Isothermal Flash by Ilias K. Nikolaidis (9217172)

    Published 2022
    “…<p dir="ltr">New algorithms for vapor – liquid (VLE) and liquid - liquid (LLE) equilibrium calculations at constant temperature, pressure and feed phase composition (PT flash), with application to mixtures containing fully dissociating electrolytes are presented. …”
  6. 6
  7. 7
  8. 8

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…However, the energy functions proposed so far by biophysicists and biochemists are still in the exploration phase and their usefulness has been demonstrated only individually. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9
  10. 10

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11
  12. 12

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  13. 13
  14. 14
  15. 15

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 16

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  17. 17

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem by Mantawy, A.H.

    Published 1999
    “…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
    Get full text
    Get full text
    article
  18. 18
  19. 19

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 20

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text