Search alternatives:
algorithm within » algorithm its (Expand Search)
algorithm allows » algorithm aoa (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm within » algorithm its (Expand Search)
algorithm allows » algorithm aoa (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
-
1
From Collatz Conjecture to chaos and hash function
Published 2023“…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
-
2
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
3
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…The introduction of the ReLU function in neural network architectures yielded substantial improvements over sigmoidal activation functions and allowed for the training of deep networks. …”
Get full text
Get full text
Get full text
masterThesis -
4
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
-
5
Scatter Search algorithm for Protein Structure Prediction
Published 2016“…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
Get full text
Get full text
Get full text
article -
6
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
8
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
9
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
10
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023“…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
Get full text
-
11
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
12
Automatic image quality evaluation in digital radiography using a modified version of the IAEA radiography phantom allowing multiple detection tasks
Published 2025“…The modulation transfer function (MTF) and the signal‐to‐noise‐ratio (SNR) dependence on exposure conditions and post‐processing algorithms do not always follow the same trends for raw and clinical images and/or different manufacturers, while the signal‐difference‐to‐noise‐ratio (SDNR) and the detectability index (d′), despite their differences, seem more appropriate to characterize IQ. …”
-
13
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022“…A biomedical application of a novel metaheuristic optimizer is proposed in this paper by constructing an enhanced arithmetic optimization algorithm (AOA). The latter algorithm was constructed using the logarithmic spiral (Ls) search mechanism from the whale optimization algorithm and the greedy selection scheme from the differential evolution algorithm. …”
-
14
-
15
-
16
-
17
-
18
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
19
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
20
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
Published 2024“…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”