Showing 1 - 20 results of 200 for search '(( algorithm from function ) OR ( ((algorithm state) OR (algorithm steps)) function ))', query time: 0.12s Refine Results
  1. 1

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Tracking analysis of normalized adaptive algorithms by Moinuddin, M.

    Published 2003
    “…Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. The results show that, unlike the stationary case, the steady-state excess-mean-square error is not a monotonically increasing function of the step-size, while the ability of the adaptive algorithm to track the variations in the environment degrades by increasing the frequency offset.…”
    Get full text
    Get full text
    article
  7. 7

    Metaheuristic Algorithm for State-Based Software Testing by Haraty, Ramzi A.

    Published 2018
    “…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 8

    Belief selection in point-based planning algorithms for POMDPs by Azar, Danielle

    Published 2017
    “…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  11. 11

    Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems by Tabbara, Mazen R.

    Published 2017
    “…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 12
  13. 13

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…In this paper we perform a comparative study among GA, SA, and TS. These algorithms have many similarities, but they also possess distinctive features, mainly in their strategies for searching the solution state space. …”
    Get full text
    article
  14. 14

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities by Moinuddin, M.

    Published 2003
    “…The results show that, unlike in the stationary case, the steady-state excess MSE is not a monotonically increasing function of the step size. …”
    Get full text
    Get full text
    article
  15. 15

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms by Zhongqiang Ma (13765801)

    Published 2023
    “…It should be noted that, except EBCM, the other 10 new algorithms are inferior to the 4 state-of-the-art algorithms in terms of convergence speed and global search ability on CEC 2017 functions. …”
  16. 16

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 17

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…FS is an important data reduction step in data mining which finds the most representative features from the entire data. …”
  18. 18

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  19. 19

    Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization by Abu Zitar, Raed

    Published 2022
    “…The gazelle optimization algorithm (GOA) is a global stochastic optimizer that is straightforward to comprehend and has powerful search capabilities. …”
    Get full text
  20. 20