Showing 1 - 20 results of 271 for search '(((( algorithm i function ) OR ( algorithm from function ))) OR ( algorithm python function ))', query time: 0.14s Refine Results
  1. 1

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …”
  7. 7

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    Evolution Of Activation Functions for Neural Architecture Search by Nader, Andrew

    Published 2020
    “…However, to the best of our knowledge, the design of new activation functions has mostly been done by hand. In this work, we propose the use of a self-adaptive evolutionary algorithm that searches for new activation functions using a genetic programming approach, and we compare the performance of the obtained activation functions to ReLU. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 9
  10. 10

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning by Sait, Sadiq M.

    Published 2006
    “…The problem of partitioning appears in several areas ranging from VLSI, parallel programming, to molecular biology. …”
    Get full text
    article
  11. 11

    An improved kernelization algorithm for r-Set Packing by Abu-Khzam, Faisal N.

    Published 2010
    “…In particular, the number of elements in a 3-Set Packing kernel is improved from a cubic function of the parameter to a quadratic one.…”
    Get full text
    Get full text
    Get full text
    article
  12. 12

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13

    Improving the Secure Socket Layer Protocol by modifying its Authentication function by El-Kassar, A. N.

    Published 2017
    “…In this paper, we propose a modification of RSA from the domain of integers to the domain of Gaussian arithmetic to be applied to the first function of SSL that would give more secure communication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 14

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…A fitness function is constructed from the total operating cost of the generating units without penalty terms. …”
    Get full text
    Get full text
    article
  15. 15

    Evolutionary algorithms for VLSI multi-objective netlist partitioning by Sait, Sadiq M.

    Published 2006
    “…The problem of partitioning appears in several areas ranging from VLSI, parallel programming to molecular biology. …”
    Get full text
    article
  16. 16

    A Comparative Study of Elgamal Based Cryptographic Algorithms by Haraty, Ramzi A.

    Published 2004
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17
  18. 18
  19. 19

    A genetic-based algorithm for fuzzy unit commitment model by Mantawy, A.H.

    Published 2000
    “…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. A fitness function is constructed from the total operating cost of the generating units plus a penalty term determined due to the fuzzy load and spinning reserve membership functions. …”
    Get full text
    Get full text
    article
  20. 20

    A comparative study of RSA based digital signature algorithms by Haraty, Ramzi A.

    Published 2006
    “…We implement the classical and modified RSA cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we implement attack algorithms to solve the factorization problem in Z, Z[<i>i</i>] and F[<i>x</i>]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article