Search alternatives:
algorithms a » algorithms _ (Expand Search), algorithm fa (Expand Search)
algorithm b » algorithm a (Expand Search), algorithms _ (Expand Search), algorithm fa (Expand Search)
b function » _ functional (Expand Search)
a function » _ functional (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm fa (Expand Search)
algorithm b » algorithm a (Expand Search), algorithms _ (Expand Search), algorithm fa (Expand Search)
b function » _ functional (Expand Search)
a function » _ functional (Expand Search)
-
1
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
2
New enumeration algorithm for regular boolean functions
Published 2018“…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: “…RD algorithm…”
Get full text
Get full text
-
4
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
5
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
Get full text
-
6
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023Subjects: “…Prairie dog optimization algorithm…”
Get full text
-
7
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
8
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
9
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
10
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
11
-
12
-
13
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022Subjects: “…Functional electrical stimulation…”
-
14
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
15
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Subjects: Get full text
doctoralThesis -
16
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
Published 2016Subjects: Get full text
doctoralThesis -
17
-
18
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
Motion Artifacts Correction From EEG and fNIRS Signals Using Novel Multiresolution Analysis
Published 2022Subjects: -
20
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …”