Showing 1 - 20 results of 232 for search '(( algorithm i function ) OR ((( algorithms within function ) OR ( algorithms hamc function ))))', query time: 0.14s Refine Results
  1. 1
  2. 2

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …”
  3. 3

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…These sequences are then utilized within the diffusion and confusion structures of the hashing function. …”
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article
  10. 10
  11. 11

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The obtained solution is an optimum offline solution that is used to select one or more sensors for any future flights within the vicinity of the 5 radars. …”
    Get full text
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
  17. 17
  18. 18
  19. 19

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 20