Search alternatives:
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
algorithm 1 » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
1 function » _ functional (Expand Search)
-
61
-
62
-
63
An improved kernelization algorithm for r-Set Packing
Published 2010“…In particular, the number of elements in a 3-Set Packing kernel is improved from a cubic function of the parameter to a quadratic one.…”
Get full text
Get full text
Get full text
article -
64
-
65
A fuzzy basis function network for generator excitation control
Published 1997Get full text
Get full text
article -
66
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
67
Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme
Published 2021“…<p dir="ltr">This work confers the simultaneous analysis of voltage and frequency control of the 3-area interconnected hybrid power system (IHPS) consisting of parabolic-trough solar power system (PSP), wind power system (WPS) and dish-stirling solar power system (DSP) under the paradigm of microgrid. …”
-
68
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
69
Belief selection in point-based planning algorithms for POMDPs
Published 2017“…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
70
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
71
A new genetic algorithm approach for unit commitment
Published 1997Get full text
Get full text
article -
72
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006Get full text
article -
73
Evolutionary algorithm for predicting all-atom protein structure
Published 2011Get full text
Get full text
Get full text
conferenceObject -
74
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
Get full text
Get full text
Get full text
article -
75
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
76
A genetic-based algorithm for fuzzy unit commitment model
Published 2000Get full text
Get full text
article -
77
-
78
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997Get full text
Get full text
article -
79
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
80
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis