Search alternatives:
algorithms spc » algorithms _ (Expand Search), algorithms a (Expand Search), algorithm sma (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
algorithms spc » algorithms _ (Expand Search), algorithms a (Expand Search), algorithm sma (Expand Search)
algorithm i » algorithm _ (Expand Search), algorithm a (Expand Search), algorithm its (Expand Search)
i function » _ functional (Expand Search)
-
41
A new genetic algorithm approach for unit commitment
Published 1997Get full text
Get full text
article -
42
-
43
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006Get full text
article -
44
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
45
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
Get full text
Get full text
Get full text
article -
46
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
Published 2024“…Moreover, one mutation in RAF1 reported elevated levels of binding between <i>RAF1</i> and <i>RAP1P</i> while in <i>RAP1A</i>, 7 mutations were reported to increase the binding affinity. …”
-
47
-
48
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020Get full text
article -
49
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
50
A genetic-based algorithm for fuzzy unit commitment model
Published 2000Get full text
Get full text
article -
51
-
52
Economic load dispatch using memetic sine cosine algorithm
Published 2022“…The proposed hybrid algorithm is abbreviated as SCA-βHC which is evaluated using two sets of real-world generation cases: (i) 3-units, two versions of 13-units, and 40-units, with neglected Ramp Rate Limits and Prohibited Operating Zones constraints. …”
Get full text
-
53
New fault models and efficient BIST algorithms for dual-portmemories
Published 1997Get full text
Get full text
article -
54
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
55
-
56
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”
-
57
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The three heuristics are applied on the same optimization problem and compared with respect to (1) quality of the best solution identified by each heuristic, (2) progress of the search frominitial solution(s) until stopping criteria are met, (3) the progress of the cost of the best solution as a function of time (iteration count), and (4) the number of solutions found at successive intervals of the cost function. …”
Get full text
article -
58
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
59
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
Published 2012Get full text
Get full text
masterThesis -
60
Tracking analysis of the NLMS algorithm in the presence of both random and cyclic nonstationarities
Published 2003“…Tracking analysis of the normalized least mean square (NLMS) algorithm is carried out in the presence of two sources of nonstationarities: 1) carrier frequency offset between transmitter and receiver; 2) random variations in the environment. …”
Get full text
Get full text
article