يعرض 1 - 20 نتائج من 92 نتيجة بحث عن '(( algorithm key functional ) OR ( ((algorithm python) OR (algorithm both)) function ))*', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 1
  2. 2

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 3

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4
  5. 5

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach حسب Nargess Sadeghzadeh-Nokhodberiz (16904952)

    منشور في 2023
    "…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
  6. 6
  7. 7
  8. 8

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments حسب Mohammadhasan Faghihi (22303057)

    منشور في 2024
    "…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
  9. 9

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    Iterative Least Squares Functional Networks Classifier حسب Faisal, Kanaan A

    منشور في 2007
    "…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    Cross entropy error function in neural networks حسب Nasr, G.E.

    منشور في 2002
    "…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 12

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  13. 13

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 15
  16. 16

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    New fault models and efficient BIST algorithms for dual-portmemories حسب Amin, A.A.

    منشور في 1997
    "…These modifications allow multiple access of memory cells for increased test speed with minimal overhead on both silicon area and device performance. New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 18

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  19. 19

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems حسب Abu Zitar, Raed

    منشور في 2022
    "…This paper is a further attempt to offer a better optimizing structure, therefore, aims to provide a better-performing algorithm both for designing an appropriate proportional-integral-derivative (PID) controller to effectively operate an automatic voltage regulator (AVR) system and extracting the optimum parameters of a power system stabilizer (PSS) employed in a single-machine infinite-bus (SMIB) power system. …"
    احصل على النص الكامل