Search alternatives:
key functional » _ functional (Expand Search), bio functional (Expand Search)
algorithm key » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
key functional » _ functional (Expand Search), bio functional (Expand Search)
algorithm key » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm etc » algorithm its (Expand Search), algorithm _ (Expand Search), algorithm fa (Expand Search)
-
1
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
2
-
3
-
4
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
5
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
6
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
7
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
8
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…<p>Neural networks have been successfully employed in various domains such as classification, regression and clustering, etc. Generally, the back propagation (BP) based iterative approaches are used to train the neural networks, however, it results in the issues of local minima, sensitivity to learning rate and slow convergence. …”
-
9
A comparative study of RSA based digital signature algorithms
Published 2006“…After factorization is found, the RSA problem could be solved by finding the private key using the extended Euclidean algorithm.…”
Get full text
Get full text
Get full text
Get full text
article -
10
A comparative study of ElGamal based digital signature algorithms
Published 2006“…We implement the classical and modified ElGamal digital signature scheme to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
article -
11
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…Algorithms were tested using the test power system IEEE39. …”
Get full text
article -
12
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
-
13
High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm
Published 2025“…<p dir="ltr">Development and modeling of proton exchange membrane fuel cells (PEMFCs) need accurate identification of unknown factors affecting mathematical models. The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
-
14
Regression testing web services-based applications
Published 2006“…Key-words : label transition systems, testing, verification, web service, web application.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
15
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
-
16
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …”
-
17
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
Get full text
Get full text
Get full text
Get full text
article -
18
A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance
Published 2024“…<p dir="ltr">A disease is a distinct abnormal state that significantly affects the functioning of all or part of an individual and is not caused by external harm. …”
-
19
Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side
Published 2024“…The key benefit of the proposed technique is the utilization of an accurate and real-time estimated dynamic model, which facilitates a reliable states prediction by the IMPC. …”
-
20
Reinforcement Learning-Based School Energy Management System
Published 2020“…In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …”