Showing 81 - 100 results of 349 for search '(( algorithm machine function ) OR ((( algorithm cost function ) OR ( algorithms a function ))))', query time: 0.14s Refine Results
  1. 81

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 82

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
    Get full text
    Get full text
    Get full text
    article
  3. 83

    Finite state machine state assignment for area and power minimization by El-Maleh, A.

    Published 2006
    “…Methods for estimating area and power of an FSM are presented. A fuzzy-based aggregation function is employed to combine the two objectives. …”
    Get full text
    Get full text
    article
  4. 84

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
    Get full text
    Get full text
    article
  5. 85

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  6. 86

    Metaheuristic Algorithm for State-Based Software Testing by Haraty, Ramzi A.

    Published 2018
    “…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 87

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”
  8. 88

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Moreover, majority of improvements made by the researchers in optimization techniques have focused on the accuracy of solution and have overlooked the convergence speed of an algorithm. Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  9. 89

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  10. 90

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …”
  11. 91

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 92

    Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm by Abdelbasset Krama (16870008)

    Published 2018
    “…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. …”
  13. 93

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. …”
  14. 94

    A Quasi-Oppositional Method for Output Tracking Control by Swarm-Based MPID Controller on AC/HVDC Interconnected Systems With Virtual Inertia Emulation by Iman M. Hosseini Naveh (16891482)

    Published 2021
    “…The role of the proposed quasi oppositional based SMPID controller is to modify the tracking strategy on AC/HVDC interconnected systems while reducing the related cost function. The proposed analysis is established considering the most highly cited, well-known tested and newly expanded swarm-based optimization algorithms (SBOAs), such as Grasshopper Optimization Algorithm (GOA), Grey Wolf Optimization (GWO), Artificial Fish Swarm Algorithm (AFSA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). …”
  15. 95

    A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder by Sait, Sadiq M.

    Published 1989
    “…The systolic algorithm is modeled in AHPL to verify functional correctness. …”
    Get full text
    Get full text
    article
  16. 96

    On the Optimization of Band Gaps in Periodic Waveguides by Jamil Renno (14070771)

    Published 2025
    “…The purpose of this work is to provide a systematic comparison of various nature-inspired algorithms across both low-cost analytical and high-fidelity simulation-driven design problems.…”
  17. 97

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…In this paper, a multiswarm-intelligence-based algorithm (MSIA) is developed to cope with bound constrained functions. …”
  18. 98

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…SSL uses three interdependent cryptographic functions to perform a secure connection. The first function is authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 99

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 100

    A parallel tabu search algorithm for VLSI standard-cell placement by Suit, S.M.

    Published 2000
    “…In this work, tabu search placement algorithm is parallelized on a network of workstations using PVM. …”
    Get full text
    Get full text
    article