Search alternatives:
algorithm flow » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
algorithm flow » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
-
41
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
42
Evolutionary algorithm for predicting all-atom protein structure
Published 2011Get full text
Get full text
Get full text
conferenceObject -
43
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
44
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
-
45
A new genetic algorithm approach for unit commitment
Published 1997Get full text
Get full text
article -
46
-
47
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006Get full text
article -
48
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
49
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
Get full text
Get full text
Get full text
article -
50
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
Published 2024“…Moreover, one mutation in RAF1 reported elevated levels of binding between <i>RAF1</i> and <i>RAP1P</i> while in <i>RAP1A</i>, 7 mutations were reported to increase the binding affinity. …”
-
51
-
52
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020Get full text
article -
53
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
54
A genetic-based algorithm for fuzzy unit commitment model
Published 2000Get full text
Get full text
article -
55
-
56
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
Get full text
-
57
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997Get full text
Get full text
article -
58
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
59
-
60
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”