Showing 1 - 20 results of 172 for search '(( algorithm its function ) OR ( algorithm ((most function) OR (cost function)) ))', query time: 0.13s Refine Results
  1. 1

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…It is used to allow the client to identify the server and optionally allow the server to identify the client. The most common cryptographic algorithm used for this function is RSA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 2

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
  3. 3

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…An objective function utilizing the covariance of the fused tracks is used by the first algorithm while a cost function based on the Kullback-Leibler (KL) divergence measure is used in the second case for training the LSTM. …”
    Get full text
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  9. 9

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  10. 10

    ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation by Said Mahfoud (17150968)

    Published 2022
    “…The new combined ACO-DTC strategy has been studied for optimizing the gains of the PID controller by using a cost function such as Integral Square Error (ISE). …”
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…The results show that the performance of the SCA-βHC algorithm is increased by tuning its parameters in proper value. …”
    Get full text
  16. 16
  17. 17

    Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem by Abu Zitar, Raed

    Published 2023
    “…In particular, a new modified method based on the Arithmetic Optimization Algorithm is proposed. The optimization is applied to a formulated cost function that considers uncertainty, false alarms, and existing clutters. …”
    Get full text
  18. 18

    Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures by Iryna Haponchyk (19691701)

    Published 2017
    “…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. …”
  19. 19

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
  20. 20

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. …”