Showing 1 - 20 results of 348 for search '((algorithm b) OR (((algorithm a) OR (algorithm fa)))) function', query time: 0.12s Refine Results
  1. 1

    A New Penalty Function Algorithm For Convex Quadratic Programming by Bendaya, M.

    Published 2020
    “…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
    Get full text
    article
  2. 2

    Salp swarm algorithm: survey, analysis, and new applications by Abualigah, Laith

    Published 2024
    “…The behavior of the species when traveling and foraging in the waters is the main source of SSA and MSSA. These two algorithms are put to test on a variety of mathematical optimization functions to see how they behave when it comes to finding the best solutions to optimization problems. …”
    Get full text
  3. 3

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  4. 4

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 5

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This paper introduces a new algorithm for enumerating regular Boolean functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 6

    A comparative study of ElGamal based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 7

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …”
    Get full text
    Get full text
    article
  8. 8
  9. 9

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…Recently, optimization problems have been revised in many domains, and they need powerful search methods to address them. In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …”
    Get full text
  10. 10
  11. 11

    Multi-Target Tracking Resources Allocation Using Multi-Agent Modeling and Auction Algorithm by De Rochechouart, Maxence

    Published 2023
    “…The results show an optimum resource allocation with an information-based cost function that is optimized by an Auction Algorithm.…”
    Get full text
  12. 12

    Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control by Abu Zitar, Raed

    Published 2022
    “…The constructed Ls-AOA algorithm was then proposed to design a proportional-integral-derivative (PID) controller employed in a functional electrical stimulation (FES) system for the first time. …”
  13. 13
  14. 14
  15. 15

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
  16. 16

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17

    Evaluation of transfer functions for punctured turbo codes by Mugaibel, A.H.

    Published 2000
    “…A modified algorithm for evaluating transfer functions of turbo codes with punctured systematic bits is presented. …”
    Get full text
    Get full text
    article
  18. 18

    Iterative Least Squares Functional Networks Classifier by Faisal, Kanaan A

    Published 2007
    “…This paper proposes unconstrained functional networks as a new classifier to deal with the pattern recognition problems. …”
    Get full text
    Get full text
    article
  19. 19

    A new multimodulus blind equalization algorithm by Abrar, Shafayat

    Published 2004
    “…A new algorithm is presented for the blind equalization of complex signals. …”
    Get full text
    Get full text
    article
  20. 20

    A new reactive power optimization algorithm by Mantawy, A.H.

    Published 2003
    “…A new implementation for the particle swarm algorithm has been applied. …”
    Get full text
    Get full text
    article