يعرض 1 - 20 نتائج من 40 نتيجة بحث عن '(( algorithm python function ) OR ((( algorithm flow function ) OR ( algorithm key functional ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 1

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. For validation of ILCA, the non‐parametric and the statistical analysis are performed using benchmark standard functions. …"
  2. 2

    A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems حسب Bilal Khurshid (16715865)

    منشور في 2024
    "…<p dir="ltr">This study investigates the no-wait flow shop scheduling problem and proposes a hybrid (HES-IG) algorithm that utilizes makespan as the objective function. …"
  3. 3

    Axes-Based Encryption Key حسب Haidar, Imane

    منشور في 2018
    "…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 4
  5. 5

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 6

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  7. 7

    Radial basis function networks for contingency analysis of bulkpower systems حسب Refaee, J.A.

    منشور في 1999
    "…The performance of the RBFN is compared with a standard AC load flow algorithm…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8

    Improving the Secure Socket Layer Protocol by modifying its Authentication function حسب El-Kassar, A. N.

    منشور في 2017
    "…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 10

    A comparative study of RSA based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    A comparative study of ElGamal based digital signature algorithms حسب Haraty, Ramzi A.

    منشور في 2006
    "…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…Aortic valve diseases are among the most common cardiovascular defects. Since a non-functioning valve results in disturbed blood flow conditions, the diagnosis of such defects is based on identification of stenosis via echocardiography. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 14

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  15. 15
  16. 16
  17. 17

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
  18. 18

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm حسب Badreddine Kanouni (23073244)

    منشور في 2025
    "…<p dir="ltr">Development and modeling of proton exchange membrane fuel cells (PEMFCs) need accurate identification of unknown factors affecting mathematical models. The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …"
  19. 19

    Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet حسب Imran Siddique (12705185)

    منشور في 2024
    "…<p dir="ltr">In current work, the unsteady stagnation point’s flow on a special third-grade fuzzy hybrid (A⁢l<sub>2</sub>⁢O<sub>3</sub> +Cu/SA) nanofluid (HNF) through a permeable convective shrinking/stretching sheet has been scrutinized. …"
  20. 20

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions حسب Al-Tayyan, Amer

    منشور في 2017
    "…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …"
    احصل على النص الكامل
    article