بدائل البحث:
algorithms a » algorithms _ (توسيع البحث), algorithm fa (توسيع البحث)
a function » _ functional (توسيع البحث)
algorithms a » algorithms _ (توسيع البحث), algorithm fa (توسيع البحث)
a function » _ functional (توسيع البحث)
-
1
New enumeration algorithm for regular boolean functions
منشور في 2018"…This paper introduces a new algorithm for enumerating regular Boolean functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
2
Application of Red Deer Algorithm in Optimizing Complex functions
منشور في 2021الموضوعات: "…RD algorithm…"
احصل على النص الكامل
احصل على النص الكامل
-
3
A New Penalty Function Algorithm For Convex Quadratic Programming
منشور في 2020"…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
احصل على النص الكامل
article -
4
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
5
Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems
منشور في 2023الموضوعات: "…Prairie dog optimization algorithm…"
احصل على النص الكامل
-
6
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
منشور في 2024"…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …"
-
7
-
8
From Collatz Conjecture to chaos and hash function
منشور في 2023"…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
9
-
10
Scatter Search algorithm for Protein Structure Prediction
منشور في 2016"…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013الموضوعات: احصل على النص الكامل
doctoralThesis -
12
-
13
-
14
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022الموضوعات: "…Functional electrical stimulation…"
-
15
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
16
A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
منشور في 2012"…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017الموضوعات: احصل على النص الكامل
doctoralThesis -
18
Efficient Algorithms for Constructing Preset Distinguishing Sequences for Nondeterministic Finite State Machines
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
19
-
20
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject