Search alternatives:
algorithm within » algorithm its (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
algorithm within » algorithm its (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
-
1
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
2
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
-
3
Learning continuous functions using decision tree learning algorithms
Published 2001Get full text
masterThesis -
4
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
5
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
6
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
7
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
8
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
9
Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT)
Published 2017“…The resulting adaptive, high-performance technique is called Genetic Algorithm with Domain-Trimming (GADT). As a proof of concept, the GADT is applied to a widely used benchmark problem. …”
Get full text
article -
10
-
11
-
12
-
13
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Get full text
doctoralThesis -
14
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…The obtained solution is an optimum offline solution that is used to select one or more sensors for any future flights within the vicinity of the 5 radars. …”
Get full text
-
15
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
Get full text
-
16
From Collatz Conjecture to chaos and hash function
Published 2023“…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
-
17
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…Optimal multiobjective design of robust multimachine power system stabilizers (PSSs) using genetic algorithms is presented in this paper. …”
Get full text
Get full text
article -
18
-
19
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
20
Tracking analysis of normalized adaptive algorithms
Published 2003“…A unified approach is carried out using a mixed-norm-type error nonlinearity. Close agreement between analytical analysis and simulation results is obtained for the case of the NLMS algorithm. …”
Get full text
Get full text
article