Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
-
1
A Comparative Study of RSA-Based Cryptographic Algorithms
Published 2005Get full text
Get full text
article -
2
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2003Get full text
Get full text
article -
3
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
4
A Comparative Study of RSA based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
5
-
6
-
7
A comparative study of ElGamal based digital signature algorithms
Published 2006Get full text
Get full text
Get full text
conferenceObject -
8
A comparative study of five regression testing algorithms
Published 1997“…We compare five regression testing algorithms that include: slicing, incremental, firewall, genetic and simulated annealing algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
New algorithm based active method to eliminate stick-slip vibrations in drill string systems
Published 2022“…Simulation results show that the proposed algorithm suppresses the stick-slip while keeping good performances compared to other SM controllers. …”
-
10
Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests
Published 2023“…This paper describes how trial-based dominance can totally order this two-variable dataset of outcomes so that traditional non-parametric methods can determine the better of two algorithms when one is faster, but less accurate than the other, i.e. when neither algorithm dominates. …”
-
11
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
12
Web Based Online Hybrid Teaching Method of Network Music Course
Published 2022“…In the context of big data, the lengthy personalized screening process of users has become one of the problems to be solved. Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …”
Get full text
-
13
-
14
Evolutionary Game-Based Battery Scheduling: A Comparative Study for Prosumers in Smart Grids
Published 2025“…A comprehensive comparative analysis is conducted between the proposed EGT algorithm and established methods such as centralized optimization (CO), game theory (GT), and auction-based approaches. …”
-
15
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
16
Environmental/economic power dispatch using multiobjective evolutionary algorithms: a comparative study
Published 2003“…A comparative study of newly developed Pareto-based multiobjective evolutionary algorithms (MOEA) applied to a nonlinear power system multiobjective optimization problem is presented in this paper. …”
Get full text
Get full text
article -
17
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
18
-
19
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …”
Get full text
-
20
A matrix-based damage assessment and recovery algorithm
Published 2014“…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …”
Get full text
Get full text
Get full text
conferenceObject