-
61
Android Malware Detection Using Machine Learning
Published 2024“…It was found that SVM using radial basis function (RBF) kernel achieved the highest performance with an accuracy of 99.5%. …”
Get full text
article -
62
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
Published 2024“…After reaching warfarin maintenance dose, the dose was recalculated using the GWD and median absolute error (MAE) and the percentage of warfarin doses within 20% of the actual dose were calculated and compared for the two algorithms. …”
-
63
-
64
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
65
A new reactive power optimization algorithm
Published 2003“…This paper presents an algorithm for optimizing reactive power using particle swarm algorithm. …”
Get full text
Get full text
article -
66
Second-order conic programming for data envelopment analysis models
Published 2022“…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
67
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…We formulate the testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
Get full text
Get full text
Get full text
Get full text
article -
68
-
69
-
70
-
71
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
72
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006“…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …”
Get full text
article -
73
An Evolutionary Algorithm for the Allocation Problem in High-Level Synthesis
Published 2005“…The system handles multicycle functional units as well as structural pipelining. The proposed method was implemented using C++ on a Linux workstation. …”
Get full text
Get full text
Get full text
article -
74
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
75
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. …”
Get full text
Get full text
Get full text
article -
76
A new genetic algorithm approach for unit commitment
Published 1997“…The problem under consideration includes two linked subproblems: a combinatorial optimization problem and a nonlinear programming problem. The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …”
Get full text
Get full text
article -
77
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
78
Belief selection in point-based planning algorithms for POMDPs
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
79
Distributed dimension reduction algorithms for widely dispersed data
Published 2002Get full text
Get full text
Get full text
conferenceObject -
80
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …”