بدائل البحث:
algorithms a » algorithms _ (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithm goa (توسيع البحث)
a function » _ functional (توسيع البحث)
algorithms a » algorithms _ (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithm goa (توسيع البحث)
a function » _ functional (توسيع البحث)
-
21
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …"
-
22
-
23
-
24
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). …"
-
25
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …"
-
26
Distributed dimension reduction algorithms for widely dispersed data
منشور في 2002"…Stress function measurements indicate that the distributed algorithm is highly competitive with the original FastMap heuristic.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
27
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
28
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
منشور في 2021"…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …"
-
29
Evaluation of transfer functions for punctured turbo codes
منشور في 2000"…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
30
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
منشور في 2017احصل على النص الكامل
doctoralThesis -
31
A new multimodulus blind equalization algorithm
منشور في 2004"…A new algorithm is presented for the blind equalization of complex signals. …"
احصل على النص الكامل
احصل على النص الكامل
article -
32
A new reactive power optimization algorithm
منشور في 2003"…A new implementation for the particle swarm algorithm has been applied. …"
احصل على النص الكامل
احصل على النص الكامل
article -
33
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …"
-
34
A Stochastic Newton-Raphson Method with Noisy Function Measurements
منشور في 2016"…This article proposes a novel recursive algorithm providing optimal iterative-varying gains associated with the NR method. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
35
Stochastic evolution algorithm for technology mapping
منشور في 1998"…SELF-Map is based on the Stochastic Evolution (SE) algorithm. The state space model of the problem is defined and suitable cost function which allows optimization for area, delay, or area-delay combinations is proposed. …"
احصل على النص الكامل
احصل على النص الكامل
article -
36
A new genetic algorithm approach for unit commitment
منشور في 1997"…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …"
احصل على النص الكامل
احصل على النص الكامل
article -
37
Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population
منشور في 2024"…To compare the accuracy of a clinical warfarin dosing (CWD) versus genetic warfarin dosing algorithms (GWD) during warfarin initiation. …"
-
38
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
39
A neural networks algorithm for data path synthesis
منشور في 2003"…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
40