بدائل البحث:
using function » using fusion (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
i function » _ functional (توسيع البحث)
using function » using fusion (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
i function » _ functional (توسيع البحث)
-
41
-
42
-
43
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
44
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
45
A new genetic algorithm approach for unit commitment
منشور في 1997"…The problem under consideration includes two linked subproblems: a combinatorial optimization problem and a nonlinear programming problem. The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …"
احصل على النص الكامل
احصل على النص الكامل
article -
46
Simultaneous stabilization of multimachine power systems viagenetic algorithms
منشور في 1999"…This paper demonstrates the use of genetic algorithms for the simultaneous stabilization of multimachine power systems over a wide range of operating conditions via single-setting power system stabilizers. …"
احصل على النص الكامل
احصل على النص الكامل
article -
47
Evolutionary algorithms for VLSI multi-objective netlist partitioning
منشور في 2006"…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …"
احصل على النص الكامل
article -
48
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
49
A neural networks algorithm for data path synthesis
منشور في 2003"…The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
50
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …"
احصل على النص الكامل
article -
51
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
منشور في 2020"…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …"
احصل على النص الكامل
article -
52
A genetic-based algorithm for fuzzy unit commitment model
منشور في 2000"…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …"
احصل على النص الكامل
احصل على النص الكامل
article -
53
Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning
منشور في 2003"…A series of experiments are performed to evaluate the efficiency of the algorithm. ISCAS-85/89 benchmark circuits are used and experimental results are reported and compared to earlier algorithms like GA and TS.…"
احصل على النص الكامل
احصل على النص الكامل
article -
54
A comparative study of RSA based digital signature algorithms
منشور في 2006"…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
55
-
56
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
57
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…Reproduction is carried out using (1 + 5)-ES, generating five offspring from one parent randomly. …"
-
58
-
59
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
60
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…This is a hard multi-criteria optimization problem. Fuzzy logic is used to combine all objective criteria into a single fuzzy evaluation (cost) function, which is then used to rate competing solutions. # 2001 Elsevier Science Ltd. …"
احصل على النص الكامل
article