بدائل البحث:
key functional » _ functional (توسيع البحث), bio functional (توسيع البحث)
algorithm both » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
algorithm key » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
key functional » _ functional (توسيع البحث), bio functional (توسيع البحث)
algorithm both » algorithm goa (توسيع البحث), algorithm aoa (توسيع البحث), algorithm its (توسيع البحث)
algorithm key » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
-
1
-
2
New enumeration algorithm for regular boolean functions
منشور في 2018"…After proving this equivalence, this paper introduces a novel data structure that may, with further tweaking, enable faster enumeration algorithms for both regular Boolean functions and all-capacities knapsack problem instances.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
3
Axes-Based Encryption Key
منشور في 2018"…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
4
-
5
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. …"
-
6
Design and Implementation of an Advanced Control and Guidance Algorithm of a Single Rotor Helicopter
منشور في 2013احصل على النص الكامل
doctoralThesis -
7
-
8
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. The proposed approach leverages a novel cost function for optimizing the agents’ coverage and the cost function eventually aligns with the conventional Voronoi-based cost function. …"
-
9
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
10
Iterative Least Squares Functional Networks Classifier
منشور في 2007"…Both methodology and learning algorithm for this kind of computational intelligence classifier using the iterative least squares optimization criterion are derived. …"
احصل على النص الكامل
احصل على النص الكامل
article -
11
Cross entropy error function in neural networks
منشور في 2002"…The ANN is implemented using the cross entropy error function in the training stage. The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
12
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
13
Improving the Secure Socket Layer Protocol by modifying its Authentication function
منشور في 2017"…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
14
A Comparative Study of Elgamal Based Cryptographic Algorithms
منشور في 2004"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
15
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
16
A comparative study of RSA based digital signature algorithms
منشور في 2006"…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
17
New fault models and efficient BIST algorithms for dual-portmemories
منشور في 1997"…These modifications allow multiple access of memory cells for increased test speed with minimal overhead on both silicon area and device performance. New fault models are proposed, and efficient O(n) test algorithms are described for both the memory array and the address decoders. …"
احصل على النص الكامل
احصل على النص الكامل
article -
18
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
منشور في 2024"…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
-
19
A comparative study of ElGamal based digital signature algorithms
منشور في 2006"…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
20
Development of Lévy flight-based reptile search algorithm with local search ability for power systems engineering design problems
منشور في 2022"…This paper is a further attempt to offer a better optimizing structure, therefore, aims to provide a better-performing algorithm both for designing an appropriate proportional-integral-derivative (PID) controller to effectively operate an automatic voltage regulator (AVR) system and extracting the optimum parameters of a power system stabilizer (PSS) employed in a single-machine infinite-bus (SMIB) power system. …"
احصل على النص الكامل