Showing 41 - 60 results of 349 for search '(( algorithm machine function ) OR ((( algorithm fa function ) OR ( algorithm a function ))))', query time: 0.17s Refine Results
  1. 41

    A new reactive power optimization algorithm by Mantawy, A.H.

    Published 2003
    “…A new implementation for the particle swarm algorithm has been applied. …”
    Get full text
    Get full text
    article
  2. 42

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  3. 43

    A Stochastic Newton-Raphson Method with Noisy Function Measurements by Saab, Khaled Kamal

    Published 2016
    “…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 44

    Stochastic evolution algorithm for technology mapping by Al-Mulhem, A.S.

    Published 1998
    “…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …”
    Get full text
    Get full text
    article
  5. 45
  6. 46

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
    Get full text
    Get full text
    article
  7. 47

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …”
  8. 48

    Finite state machine state assignment for area and power minimization by El-Maleh, A.

    Published 2006
    “…Methods for estimating area and power of an FSM are presented. A fuzzy-based aggregation function is employed to combine the two objectives. …”
    Get full text
    Get full text
    article
  9. 49

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
    Get full text
    Get full text
    Get full text
    article
  10. 50

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 51

    Metaheuristic Algorithm for State-Based Software Testing by Haraty, Ramzi A.

    Published 2018
    “…This article presents a metaheuristic algorithm for testing software, especially web applications, which can be modeled as a state transition diagram. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 52

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…The performance of the RBFN is compared with a standard AC load flow algorithm…”
    Get full text
    Get full text
    article
  13. 53

    New fault models and efficient BIST algorithms for dual-portmemories by Amin, A.A.

    Published 1997
    “…The testability problem of dual-port memories is investigated. A functional model is defined, and architectural modifications to enhance the testability of such chips are described. …”
    Get full text
    Get full text
    article
  14. 54

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …”
  15. 55

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”
  16. 56

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…<p dir="ltr">The present study introduces a nature inspired improved liver cancer algorithm (ILCA) for solving the non‐convex engineering optimization issues. …”
  17. 57

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
    Get full text
    Get full text
    article
  18. 58

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 59

    Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation by Abualigah, Laith

    Published 2023
    “…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
    Get full text
  20. 60

    A systolic algorithm for VLSI design of a 1/N rate Viterbi decoder by Sait, Sadiq M.

    Published 1989
    “…The systolic algorithm is modeled in AHPL to verify functional correctness. …”
    Get full text
    Get full text
    article