بدائل البحث:
algorithms hamc » algorithms a (توسيع البحث)
hamc function » heart function (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
i function » _ functional (توسيع البحث)
algorithms hamc » algorithms a (توسيع البحث)
hamc function » heart function (توسيع البحث)
algorithm i » algorithm _ (توسيع البحث), algorithm a (توسيع البحث), algorithm its (توسيع البحث)
i function » _ functional (توسيع البحث)
-
41
A new genetic algorithm approach for unit commitment
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
article -
42
-
43
Evolutionary algorithms for VLSI multi-objective netlist partitioning
منشور في 2006احصل على النص الكامل
article -
44
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
45
A neural networks algorithm for data path synthesis
منشور في 2003"…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
46
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
منشور في 2024"…Moreover, one mutation in RAF1 reported elevated levels of binding between <i>RAF1</i> and <i>RAP1P</i> while in <i>RAP1A</i>, 7 mutations were reported to increase the binding affinity. …"
-
47
-
48
-
49
A comparative study of RSA based digital signature algorithms
منشور في 2006"…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
50
-
51
-
52
Economic load dispatch using memetic sine cosine algorithm
منشور في 2022"…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …"
احصل على النص الكامل
-
53
-
54
Mobile robots obstacles avoidance using dynamic window approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
55
-
56
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …"
-
57
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…The three heuristics are applied on the same optimization problem and compared with respect to (1) quality of the best solution identified by each heuristic, (2) progress of the search frominitial solution(s) until stopping criteria are met, (3) the progress of the cost of the best solution as a function of time (iteration count), and (4) the number of solutions found at successive intervals of the cost function. …"
احصل على النص الكامل
article -
58
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
-
59
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
60
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
منشور في 2003"…Tracking analysis of the normalized least mean square (NLMS) algorithm is carried out in the presence of two sources of nonstationarities: 1) carrier frequency offset between transmitter and receiver; 2) random variations in the environment. …"
احصل على النص الكامل
احصل على النص الكامل
article