Search alternatives:
algorithm three » algorithm survey (Expand Search)
three function » taste function (Expand Search)
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
both function » cost function (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
algorithm three » algorithm survey (Expand Search)
three function » taste function (Expand Search)
algorithm both » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
both function » cost function (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
-
1
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
2
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The results obtained show that the introduced algorithm outperforms the deterministic technique based on the direct cover approach [3] in terms of the average number of product terms required to realize a given MVL function.…”
Get full text
Get full text
article -
3
New enumeration algorithm for regular boolean functions
Published 2018“…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…Tracking analysis of the normalized least mean square (NLMS) algorithm is carried out in the presence of two sources of nonstationarities: 1) carrier frequency offset between transmitter and receiver; 2) random variations in the environment. …”
Get full text
Get full text
article -
5
Iterative Least Squares Functional Networks Classifier
Published 2007“…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …”
Get full text
Get full text
article -
6
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…For this purpose, logarithmic BLFs including both the trajectory errors and the errors between the quadcopters’ distances with the desired ones (for the formation goal) are proposed. …”
-
7
-
8
-
9
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
10
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…The contributions of this work are summarized as follows: (1) introducing a new approximation algorithm with high precision and application-based flexibility; (2) introducing a new rational approximation formula that outperforms literature alternatives with the algorithm at higher accuracy requirement; and (3) presenting a practical evaluation index for rational approximations in the literature.…”
-
11
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …”
-
12
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
13
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject -
15
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
16
-
17
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …”
Get full text
article -
18
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…Fuzzy rules are incorporated in order to handle the multiobjective cost function. For SimE, fuzzy goodness functions are designed for delay and power, and proved efficient. …”
Get full text
article -
19
Evolutionary algorithm for protein structure prediction
Published 2010“…A protein is characterized by its 3D structure, which defines its biological function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
20