Showing 61 - 80 results of 266 for search '(( algorithms within function ) OR ((( algorithm 1 function ) OR ( algorithm analysis function ))))', query time: 0.15s Refine Results
  1. 61
  2. 62
  3. 63

    An improved kernelization algorithm for r-Set Packing by Abu-Khzam, Faisal N.

    Published 2010
    “…In particular, the number of elements in a 3-Set Packing kernel is improved from a cubic function of the parameter to a quadratic one.…”
    Get full text
    Get full text
    Get full text
    article
  4. 64
  5. 65
  6. 66
  7. 67

    Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme by Sudhanshu Ranjan (17151115)

    Published 2021
    “…<p dir="ltr">This work confers the simultaneous analysis of voltage and frequency control of the 3-area interconnected hybrid power system (IHPS) consisting of parabolic-trough solar power system (PSP), wind power system (WPS) and dish-stirling solar power system (DSP) under the paradigm of microgrid. …”
  8. 68

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  9. 69

    Belief selection in point-based planning algorithms for POMDPs by Azar, Danielle

    Published 2017
    “…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
    Get full text
    Get full text
    Get full text
    article
  15. 75

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 76
  17. 77
  18. 78
  19. 79

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 80