Search alternatives:
algorithm within » algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm within » algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
1
New enumeration algorithm for regular boolean functions
Published 2018“…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
2
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021Subjects: “…RD algorithm…”
Get full text
Get full text
-
3
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
4
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
Get full text
Get full text
article -
5
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
Published 2023Subjects: “…Prairie dog optimization algorithm…”
Get full text
-
6
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …”
-
7
From Collatz Conjecture to chaos and hash function
Published 2023“…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
8
Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm
Published 2023Subjects: Get full text
-
9
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
10
Scatter Search algorithm for Protein Structure Prediction
Published 2016“…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
Get full text
Get full text
Get full text
article -
11
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
Published 2013Subjects: Get full text
doctoralThesis -
12
-
13
-
14
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
Published 2022Subjects: “…Functional electrical stimulation…”
-
15
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
16
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
Published 2012“…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
Get full text
Get full text
Get full text
article -
17
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Subjects: Get full text
doctoralThesis -
18
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
Published 2016Subjects: Get full text
doctoralThesis -
19
-
20
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject