يعرض 1 - 20 نتائج من 22 نتيجة بحث عن '(( algorithm key functional ) OR ( algorithm python function ))*', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 2
  3. 3

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  5. 5

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 7

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 9
  10. 10
  11. 11

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm حسب Badreddine Kanouni (23073244)

    منشور في 2025
    "…<p dir="ltr">Development and modeling of proton exchange membrane fuel cells (PEMFCs) need accurate identification of unknown factors affecting mathematical models. The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …"
  12. 12
  13. 13

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  14. 14

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems حسب Hisham A. Kholidy (18891802)

    منشور في 2019
    "…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …"
  15. 15

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side حسب Ali Sharida (17947847)

    منشور في 2024
    "…The key benefit of the proposed technique is the utilization of an accurate and real-time estimated dynamic model, which facilitates a reliable states prediction by the IMPC. …"
  16. 16

    Reinforcement Learning-Based School Energy Management System حسب Yassine Chemingui (18891757)

    منشور في 2020
    "…In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …"
  17. 17

    Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog... حسب Mutasim Baba, Fuad

    منشور في 2023
    "…High energy-efficient building envelope, appropriate window-wall ratio and window type, natural ventilation during the day, and night cooling can play a key role in achieving the objectives under current weather conditions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  18. 18

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…With 7Kbits/s/Hz and 1e-1, respectively, the key metrics of spectral efficiency and BER are enhanced.…"
  19. 19
  20. 20

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation حسب Jahed, Karim

    منشور في 2016
    "…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. The key novel characteristics of our system include seamless neighbor discovery and link quality estimation, intelligent clustering and channel allocation algorithms based on constrained minimum spanning trees, robustness against device mobility, and device centric operation with no changes to existing wireless systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject