Search alternatives:
algorithms based » algorithms a (Expand Search)
using function » using fusion (Expand Search)
algorithms based » algorithms a (Expand Search)
using function » using fusion (Expand Search)
-
1
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
2
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
3
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
4
-
5
-
6
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
7
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
Get full text
Get full text
Get full text
Get full text
article -
8
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
10
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
11
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
Get full text
article -
12
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…The proposed algorithm (Ls-AOA) was tested against unimodal and multimodal benchmark functions and demonstrated better capability comparatively using other efficient metaheuristic algorithms reported in the literature. …”
-
13
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …”
Get full text
-
15
-
16
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
17
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…Further, we compared the results of the iterative heuristics with a modified FM algorithm, named PowerFM, which targets power optimization. …”
Get full text
article -
18
Evolutionary algorithm for protein structure prediction
Published 2010“…In this paper, we present an improved genetic algorithm (GA) for predicting 3D structures of proteins based on the hydrophobic polar model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…This paper presents a new algorithm based on integrating the use of genetic algorithms and tabu search methods to solve the unit commitment problem. …”
Get full text
article -
20
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …”
Get full text
Get full text
article