Search alternatives:
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
algorithm from » algorithm fa (Expand Search), algorithm goa (Expand Search), algorithm aoa (Expand Search)
-
21
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
22
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
Get full text
Get full text
article -
23
A comparative study of RSA based digital signature algorithms
Published 2006“…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
Get full text
Get full text
Get full text
Get full text
article -
24
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
25
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In this spirit, a forcing function which is derived from a spherical-cavity expansion analysis has been implemented in PRONTO 3D. …”
Get full text
Get full text
Get full text
conferenceObject -
26
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…Abstract Evolutionary algorithms, simulated annealing (SA), and tabu search (TS) are general iterative algorithms for combinatorial optimization. …”
Get full text
article -
27
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …”
-
28
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
Published 2012Get full text
Get full text
masterThesis -
29
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The solutions are evaluated using Otsu's fitness function throughout the optimization process. The picture histogram is used to display the algorithm's potential solutions. …”
Get full text
-
30
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…The fitness function is constructed from the total operating cost of the generating units without penalty terms. …”
Get full text
Get full text
article -
31
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The plant height of wild blueberry, field slope, and fruit zone readings were collected from each of the plots. For the purpose of predicting ground loss as a function of fruit zone, plant height, fruit production, slope, leaf loss, and blower damage, three ML models i.e., support vector regression (SVR), linear regression (LR), and random forest (RF)—were used. …”
-
32
Performance assessment and exhaustive listing of 500+ nature-inspired metaheuristic algorithms
Published 2023“…Generally, the inventors attribute the novelties of these new algorithms to inspirations from either biology, human behaviors, physics, or other phenomena. …”
-
33
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
34
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…FS is an important data reduction step in data mining which finds the most representative features from the entire data. Many FS-based swarm intelligence algorithms have been used to tackle FS. …”
-
35
A New Genetic-Based Tabu Search Algorithm For Unit Commitment Problem
Published 2020“…A fitness function is constructed from the total operating cost of the generating units without penalty terms. …”
Get full text
article -
36
Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem
Published 2020“…The fitness function is constructed from the total operating cost of the generating units without penalty terms. …”
Get full text
article -
37
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …”
Get full text
Get full text
-
38
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
Published 2022“…The gazelle optimization algorithm (GOA) is a global stochastic optimizer that is straightforward to comprehend and has powerful search capabilities. …”
Get full text
-
39
GATS: A Novel Hybrid Algorithm for Multiobjective Cell Placement in VLSI Circuit Design
Published 2020“…Due to imprecise nature of objective values, fuzzy logic is incorporated in the design of aggregating function. The above technique is applied to the placement of ISCAS-89 benchmark circuits and the results are compared with those obtained from individual application of GA and TS on this problem.…”
Get full text
article -
40