Search alternatives:
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
used » use (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
used » use (Expand Search)
-
41
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
-
42
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
43
A new genetic algorithm approach for unit commitment
Published 1997“…The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …”
Get full text
Get full text
article -
44
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
45
BUC algorithm for iceberg cubes
Published 2003“…In this paper, we implement the Bottom-Up Computation (BUC) algorithm for computing Iceberg cubes and conduct a sensitivity analysis of BUC with respect to the probability density function of the data. …”
Get full text
Get full text
Get full text
conferenceObject -
46
A neural networks algorithm for data path synthesis
Published 2003“…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
Get full text
Get full text
Get full text
article -
47
From Collatz Conjecture to chaos and hash function
Published 2023“…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
48
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
Get full text
-
49
Optimal multiobjective design of robust power system stabilizers using genetic algorithms
Published 2003“…The problem of robustly selecting the parameters of the power system stabilizers is converted to an optimization problem which is solved by a genetic algorithm with the eigenvalue-based multiobjective function. …”
Get full text
Get full text
article -
50
Robust Coordinated Design of Excitation and TCSC-Based Stabilizers Using genetic algorithms
Published 2004“…The coordinated design problem of robust excitation and TCSC-based controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with an eigenvalue-based objective function. …”
Get full text
article -
51
Cross entropy error function in neural networks
Published 2002“…The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
52
Evolution Of Activation Functions for Neural Architecture Search
Published 2020“…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
Get full text
Get full text
Get full text
masterThesis -
53
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …”
Get full text
Get full text
-
54
Application of Red Deer Algorithm in Optimizing Complex functions
Published 2021“…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
Get full text
Get full text
-
55
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
56
-
57
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…SSL uses three interdependent cryptographic functions to perform a secure connection. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
58
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
59
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
60
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…A series of experiments are performed to evaluate the efficiency of the algorithms. …”
Get full text
article