Showing 1 - 20 results of 190 for search '(( algorithm from function ) OR ((( algorithm within function ) OR ( algorithm allows function ))))', query time: 0.13s Refine Results
  1. 1

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
  2. 2
  3. 3

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 4

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
  5. 5

    Scatter Search algorithm for Protein Structure Prediction by Mansour, Nashat

    Published 2016
    “…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
    Get full text
    Get full text
    Get full text
    article
  6. 6

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 7

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 8
  9. 9

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  10. 10

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  11. 11

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  12. 12

    Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks by Ioannis A. Tsalafoutas (14776939)

    Published 2025
    “…The modulation transfer function (MTF) and the signal‐to‐noise‐ratio (SNR) dependence on exposure conditions and post‐processing algorithms do not always follow the same trends for raw and clinical images and/or different manufacturers, while the signal‐difference‐to‐noise‐ratio (SDNR) and the detectability index (d′), despite their differences, seem more appropriate to characterize IQ. …”
  13. 13

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …”
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”