Showing 41 - 60 results of 590 for search '(((( implementing a algorithm ) OR ( element method algorithm ))) OR ( level using algorithm ))', query time: 0.14s Refine Results
  1. 41

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 42

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. …”
    Get full text
  3. 43

    A New Parallel Genetic Algorithm Model by Al-Somani, Turki F.

    Published 2020
    “…This paper presents an implementation of three Genetic Algorithm models for solving a reliability optimization problem for a redundancy system with several failure modes, a modification on a parallel a genetic algorithm model and a new parallel genetic algorithm model. …”
    Get full text
    article
  4. 44

    A new reactive power optimization algorithm by Mantawy, A.H.

    Published 2003
    “…A new implementation for the particle swarm algorithm has been applied. …”
    Get full text
    Get full text
    article
  5. 45

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  6. 46

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms by Arafat Rahman (8065562)

    Published 2021
    “…A machine learning classification pipeline is developed using multi-domain feature extraction (time, frequency, time-frequency), feature selection (Gini impurity), classifier design, and score level fusion. …”
  7. 47

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
    Get full text
    Get full text
    article
  8. 48
  9. 49
  10. 50
  11. 51

    A hybrid graph representation for exact graph algorithms by Abu-Khzam, Faisal N.

    Published 2014
    “…We investigate practical implementation-based aspects of exact graph algorithms by providing a simple hybrid graph representation that trades space for time to address the said take-back challenge. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 52

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…In this paper, we investigate practical implementation-based aspects of exact algorithms by providing a hybrid graph representation that addresses the take-back challenge and combines the advantage of O(1)O(1) adjacency-queries in adjacency-matrices with the advantage of efficient neighborhood traversal in adjacency-lists.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 53

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
    Get full text
    Get full text
    article
  14. 54

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 55

    A Parallel Algorithm for Inverse Halftoning and its Hardware by Siddiqi, Umair F.

    Published 2006
    “…Lookup Table (LUT) method for inverse halftoning is computation less, fast and also yields goods results. This paper proposes a parallel algorithm for inverse halftoning by parallelizing the LUT method of inverse halftoning. …”
    Get full text
    article
  16. 56

    A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates by Andrianarison, O.

    Published 2024
    “…The whole piezoelectric multilayered plate’s dynamic stiffness is then built, from which its circular frequencies are computed with the help of the Wittrick-Williams algorithm. A detailed discussion is provided on the implementation aspects, followed by some numerical examples to assess the robustness, accuracy and effectiveness of the proposed method. …”
    Get full text
    article
  17. 57
  18. 58

    A simplified sliding‐mode control method for multi‐level transformerless DVR by Hasan Komurcugil (16388513)

    Published 2022
    “…<p dir="ltr">Here, a finite-control-set sliding-mode control (FCS-SMC) method is proposed for single-phase three-level T-type inverter-based transformerless dynamic voltage restorers (TDVRs). …”
  19. 59

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm by Ghulam Jillani Ansari (16896342)

    Published 2021
    “…Second, a feature level fusion approach is used to combine the features. …”
  20. 60

    Activity-level space scheduling by Zouein, Pierrette P.

    Published 1992
    “…Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…”
    Get full text
    Get full text
    Get full text
    conferenceObject