Showing 41 - 60 results of 233 for search '(( algorithm 1 function ) OR ((( algorithms within function ) OR ( algorithm fa function ))))', query time: 0.15s Refine Results
  1. 41
  2. 42

    Ensemble Deep Random Vector Functional Link Neural Network for Regression by Minghui Hu (2457952)

    Published 2022
    “…<p dir="ltr">Inspired by the ensemble strategy of machine learning, deep random vector functional link (dRVFL), and ensemble dRVFL (edRVFL) has shown state-of-the-art results on different datasets. …”
  3. 43
  4. 44

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
    Get full text
    Get full text
    Get full text
    article
  5. 45

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 46

    Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics by Abbas Khan (5141000)

    Published 2024
    “…Hence, the current study focuses on the screening of clinically reported substitutions in the <i>RAF1</i> and <i>RAP1A</i> genes using predictive algorithms integrated with all‐atoms simulation, essential dynamics, and binding free energy methods. …”
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
    Get full text
  13. 53

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 54
  15. 55

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…The three heuristics are applied on the same optimization problem and compared with respect to (1) quality of the best solution identified by each heuristic, (2) progress of the search frominitial solution(s) until stopping criteria are met, (3) the progress of the cost of the best solution as a function of time (iteration count), and (4) the number of solutions found at successive intervals of the cost function. …”
    Get full text
    article
  16. 56
  17. 57
  18. 58

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems by Bilal Khurshid (16715865)

    Published 2024
    “…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
  19. 59
  20. 60

    Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities by Moinuddin, M.

    Published 2003
    “…Tracking analysis of the normalized least mean square (NLMS) algorithm is carried out in the presence of two sources of nonstationarities: 1) carrier frequency offset between transmitter and receiver; 2) random variations in the environment. …”
    Get full text
    Get full text
    article