Showing 1 - 20 results of 217 for search '(( algorithm python function ) OR ((( algorithm i function ) OR ( algorithm 1 function ))))', query time: 0.14s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Accuracy of an internationally validated genetic-guided warfarin dosing algorithm compared to a clinical algorithm in an Arab population by Amr M. Fahmi (21632909)

    Published 2024
    “…<h3>Purpose</h3><p dir="ltr">To identify the impact of <i>CYP2C9*2, *3, VKORC1−1639 G>A </i>and <i>CYP4F2*3</i> on warfarin dose in an Arab population. …”
  7. 7
  8. 8
  9. 9

    Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach by Nargess Sadeghzadeh-Nokhodberiz (16904952)

    Published 2023
    “…Therefore, the asymptotic convergence of the designed distributed algorithm to the centralized one is guaranteed. Moreover, due to the under-actuated feature of a quadcopter system, a general hierarchical scheme is considered for designing the controller. …”
  10. 10
  11. 11
  12. 12

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm by El-Kassar, A. N.

    Published 2005
    “…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …”
  18. 18
  19. 19
  20. 20