Search alternatives:
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm goa (Expand Search)
-
21
Stochastic evolution algorithm for technology mapping
Published 1998“…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …”
Get full text
Get full text
article -
22
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
Get full text
Get full text
Get full text
article -
23
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …”
-
24
A new genetic algorithm approach for unit commitment
Published 1997“…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
Get full text
Get full text
article -
25
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
26
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997“…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
Get full text
Get full text
article -
27
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…The performance of the RBFN is compared with a standard AC load flow algorithm…”
Get full text
Get full text
article -
28
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
Get full text
Get full text
Get full text
Get full text
article -
29
Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm
Published 2024“…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …”
-
30
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…The model takes the uncertainties in the forecasted load demand and the spinning reserve constraints in a fuzzy frame. The genetic algorithm (GA) approach is then used to solve the proposed fuzzy UCP model. …”
Get full text
Get full text
article -
31
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
32
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
Published 2023“…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
Get full text
-
33
A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder
Published 1989“…The systolic algorithm is modeled in AHPL to verify functional correctness. …”
Get full text
Get full text
article -
34
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
35
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…Finally, we present potential future research directions/opportunities that can inspire the researchers to improve the RVFL’s architecture and learning algorithm further. </p> <h2>Other Information</h2> <p>Published in: Applied Soft Computing<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/ </a> <br> See article on publisher's website: <a href="http://dx.doi.org/10.1016/j.asoc.2023.110377" target="_blank">http://dx.doi.org/10.1016/j.asoc.2023.110377</a> </p>…”
-
36
A parallel tabu search algorithm for VLSI standard-cell placement
Published 2000“…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
Get full text
Get full text
article -
37
A deterministic heuristic algorithm for optimal multiprocessor scheduling. (c1995)
Published 1995Get full text
Get full text
masterThesis -
38
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…In this paper, a multiswarm-intelligence-based algorithm (MSIA) is developed to cope with bound constrained functions. …”
-
39
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…In this paper we perform a comparative study among GA, SA, and TS. These algorithms have many similarities, but they also possess distinctive features, mainly in their strategies for searching the solution state space. …”
Get full text
article -
40
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article