Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
level using » level fusion (Expand Search)
implementing » implemented (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
level using » level fusion (Expand Search)
implementing » implemented (Expand Search)
element » elements (Expand Search)
-
41
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
42
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. …”
Get full text
-
43
A New Parallel Genetic Algorithm Model
Published 2020“…This paper presents an implementation of three Genetic Algorithm models for solving a reliability optimization problem for a redundancy system with several failure modes, a modification on a parallel a genetic algorithm model and a new parallel genetic algorithm model. …”
Get full text
article -
44
A new reactive power optimization algorithm
Published 2003“…A new implementation for the particle swarm algorithm has been applied. …”
Get full text
Get full text
article -
45
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
46
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…A machine learning classification pipeline is developed using multi-domain feature extraction (time, frequency, time-frequency), feature selection (Gini impurity), classifier design, and score level fusion. …”
-
47
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
Get full text
Get full text
article -
48
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
49
-
50
-
51
A hybrid graph representation for exact graph algorithms
Published 2014“…We investigate practical implementation-based aspects of exact graph algorithms by providing a simple hybrid graph representation that trades space for time to address the said take-back challenge. …”
Get full text
Get full text
Get full text
conferenceObject -
52
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…In this paper, we investigate practical implementation-based aspects of exact algorithms by providing a hybrid graph representation that addresses the take-back challenge and combines the advantage of O(1)O(1) adjacency-queries in adjacency-matrices with the advantage of efficient neighborhood traversal in adjacency-lists.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
53
A new genetic algorithm approach for unit commitment
Published 1997“…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
Get full text
Get full text
article -
54
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
55
A Parallel Algorithm for Inverse Halftoning and its Hardware
Published 2006“…Lookup Table (LUT) method for inverse halftoning is computation less, fast and also yields goods results. This paper proposes a parallel algorithm for inverse halftoning by parallelizing the LUT method of inverse halftoning. …”
Get full text
article -
56
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
Published 2024“…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
Get full text
article -
57
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…In addition, it can be implemented in a low-cost control platform due to its simplicity. …”
-
58
A simplified sliding‐mode control method for multi‐level transformerless DVR
Published 2022“…<p dir="ltr">Here, a finite-control-set sliding-mode control (FCS-SMC) method is proposed for single-phase three-level T-type inverter-based transformerless dynamic voltage restorers (TDVRs). …”
-
59
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
Published 2021“…Second, a feature level fusion approach is used to combine the features. …”
-
60
Activity-level space scheduling
Published 1992“…Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…”
Get full text
Get full text
Get full text
conferenceObject