Showing 1 - 20 results of 332 for search '(( algorithm module function ) OR ( ((algorithm i) OR (algorithm using)) function ))', query time: 0.13s Refine Results
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
    Get full text
    Get full text
    article
  2. 2
  3. 3

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  4. 4

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  6. 6

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) by AlHamaydeh, Mohammad

    Published 2017
    “…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …”
    Get full text
    article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. </p><h3>Methods</h3><p dir="ltr">A cohort of Arab patients newly starting on warfarin had their dose calculated using CWD published in www.warfarindosing.org and were followed for 1 month. …”
  12. 12
  13. 13

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
    Get full text
  14. 14

    An incremental approach for test scheduling and synthesis using genetic algorithms by Harmanani, H.

    Published 2017
    “…This method maximizes concurrent testing of modules while performing the allocation of functional units, test registers, and multiplexers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms by Harmanani, H. M.

    Published 2007
    “…The method maximizes concurrent testing of modules while performing the allocation of functional units, test registers, and interconnects. …”
    Get full text
    Get full text
    Get full text
    article
  16. 16

    Optimal multiobjective design of robust power system stabilizers using genetic algorithms by Abdel-Magid, Y.L.

    Published 2003
    “…Optimal multiobjective design of robust multimachine power system stabilizers (PSSs) using genetic algorithms is presented in this paper. …”
    Get full text
    Get full text
    article
  17. 17
  18. 18

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
    Get full text
    Get full text
  19. 19

    Tracking analysis of normalized adaptive algorithms by Moinuddin, M.

    Published 2003
    “…A unified approach is carried out using a mixed-norm-type error nonlinearity. Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. …”
    Get full text
    Get full text
    article
  20. 20