Search alternatives:
key functional » _ functional (Expand Search), bio functional (Expand Search)
algorithm key » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
key functional » _ functional (Expand Search), bio functional (Expand Search)
algorithm key » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithm a (Expand Search), algorithms _ (Expand Search)
b function » _ functional (Expand Search)
-
1
A New Penalty Function Algorithm For Convex Quadratic Programming
Published 2020“…In this paper, we develop an exterior point algorithm for convex quadratic programming using a penalty function approach. …”
Get full text
article -
2
A comparative study of RSA based digital signature algorithms
Published 2006“…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
3
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
4
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
-
6
-
7
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
9
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
11
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
12
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …”
-
13
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…Algorithms were tested using the test power system IEEE39. …”
Get full text
article -
14
-
15
-
16
High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm
Published 2025“…<p dir="ltr">Development and modeling of proton exchange membrane fuel cells (PEMFCs) need accurate identification of unknown factors affecting mathematical models. The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
-
17
-
18
Optimizing clopidogrel dose response
Published 2016Get full text
Get full text
Get full text
Get full text
article -
19
A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance
Published 2024“…Hence, in this study, deep learning algorithms, such as VGG16, EfficientNetB4, and ResNet, are utilized to diagnose various diseases, such as Alzheimer's, brain tumors, skin diseases, and lung diseases. …”
-
20
Kernel-Ridge-Regression-Based Randomized Network for Brain Age Classification and Estimation
Published 2024“…Moreover, the proposed algorithm demonstrated excellent prediction accuracy with a mean absolute error (MAE) of <b>3.89</b> years, <b>3.64 </b>years, and <b>4.49</b> years for GM, WM, and CSF regions, confirming that changes in WM volume are significantly associated with normal brain aging. …”