يعرض 21 - 40 نتائج من 349 نتيجة بحث عن '(( algorithm machine function ) OR ((( algorithms a function ) OR ( algorithm a function ))))', وقت الاستعلام: 0.23s تنقيح النتائج
  1. 21

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
  2. 22
  3. 23
  4. 24

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …"
  5. 25

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control حسب Abu Zitar, Raed

    منشور في 2022
    "…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …"
  6. 26

    Distributed dimension reduction algorithms for widely dispersed data حسب Abu-Khzam, F.N.

    منشور في 2002
    "…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 27

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 28

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm حسب Ghulam Jillani Ansari (16896342)

    منشور في 2021
    "…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
  9. 29

    Evaluation of transfer functions for punctured turbo codes حسب Mugaibel, A.H.

    منشور في 2000
    "…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 30
  11. 31

    A new multimodulus blind equalization algorithm حسب Abrar, Shafayat

    منشور في 2004
    "…A new algorithm is presented for the blind equalization of complex signals. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 32

    A new reactive power optimization algorithm حسب Mantawy, A.H.

    منشور في 2003
    "…A new implementation for the particle swarm algorithm has been applied. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 33

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
  14. 34
  15. 35

    Stochastic evolution algorithm for technology mapping حسب Al-Mulhem, A.S.

    منشور في 1998
    "…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 36

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 37

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population حسب Amr M. Fahmi (21632909)

    منشور في 2024
    "…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …"
  18. 38

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 39

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 40