يعرض 1 - 20 نتائج من 348 نتيجة بحث عن '(( algorithm _i function ) OR ((( algorithm a function ) OR ( algorithm fa function ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 1

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2
  3. 3

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …"
  5. 5

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6

    A New Penalty Function Algorithm For Convex Quadratic Programming حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …"
    احصل على النص الكامل
    article
  7. 7

    Application of Red Deer Algorithm in Optimizing Complex functions حسب Zitar, Raed

    منشور في 2021
    "…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …"
    احصل على النص الكامل
    احصل على النص الكامل
  8. 8

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9
  10. 10

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Evolutionary algorithm for predicting all-atom protein structure حسب Mansour, Nashat

    منشور في 2011
    "…This algorithm produces a 3D structure of the whole protein, including back-bone and side-chain atoms, by minimizing the energy function associated with the structure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12

    A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods حسب Abu Zitar, Raed

    منشور في 2023
    "…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …"
    احصل على النص الكامل
  13. 13

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. …"
    احصل على النص الكامل
    article
  14. 14

    Economic load dispatch using memetic sine cosine algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …"
    احصل على النص الكامل
  15. 15

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
  16. 16

    Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms حسب Zhongqiang Ma (13765801)

    منشور في 2023
    "…In addition, whether these algorithms have a search bias to the origin (i.e., the center of the search space) is investigated. …"
  17. 17

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection حسب Abu Zitar, Raed

    منشور في 2022
    "…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …"
  18. 18

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems حسب Abualigah, Laith

    منشور في 2023
    "…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
    احصل على النص الكامل
  19. 19

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…They have been exposed to cyberattacks because of their integration with an insecure network. In the event of a violation in internet security, an attacker was able to interfere with the system's functions, which might result in catastrophic consequences. …"
    احصل على النص الكامل
    احصل على النص الكامل
  20. 20