يعرض 1 - 20 نتائج من 237 نتيجة بحث عن '(((( algorithm key functional ) OR ( algorithm based function ))) OR ( algorithm python function ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 2
  3. 3

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    Optimized Load-Scheduling Algorithm for CubeSat's Electric Power System Management Considering Communication Link حسب Bayan Hussein (16904856)

    منشور في 2023
    "…An optimization problem is formulated with data rate and BER in the cost function while maintaining energy and power constraints. …"
  8. 8
  9. 9

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  10. 10

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology حسب Senyuk, Mihail

    منشور في 2023
    "…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …"
    احصل على النص الكامل
    article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…The search space is too large to be explored by deterministic algorithms. In this paper, a Genetic Algorithm based algorithm for synthesis of MVL functions is proposed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 16
  17. 17

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm حسب Badreddine Kanouni (23073244)

    منشور في 2025
    "…<p dir="ltr">Development and modeling of proton exchange membrane fuel cells (PEMFCs) need accurate identification of unknown factors affecting mathematical models. The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …"
  18. 18

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems حسب Abualigah, Laith

    منشور في 2023
    "…In this paper, a novel hybrid optimization algorithm is proposed to solve various benchmark functions, which is called IPDOA. …"
    احصل على النص الكامل
  19. 19

    Metaheuristic Algorithm for State-Based Software Testing حسب Haraty, Ramzi A.

    منشور في 2018
    "…SA evolves a solution by minimizing an energy function that is based on testing objectives such as coverage, diversity, and continuity of events. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    Belief selection in point-based planning algorithms for POMDPs حسب Azar, Danielle

    منشور في 2017
    "…Current point-based planning algorithms for solving partially observable Markov decision processes (POMDPs) have demonstrated that a good approximation of the value function can be derived by interpolation from the values of a specially selected set of points. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject