Search Results - "Bouroubi, Sadek"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm by Kantour, Nedjmeddine, Bouroubi, Sadek

    Published in Mobile networks and applications (01-02-2020)
    “…In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards. Two years later, an asymmetric…”
    Get full text
    Journal Article
  2. 2

    A hybrid population-based algorithm for solving the Minimum Dominating Set Problem by Bouroubi, Sadek, Zouilekh, Belkacem

    “…The Minimum Dominating Sets (MDS) problem is pivotal across diverse fields like social networks and ad hoc wireless networks, representing a significant…”
    Get full text
    Journal Article
  3. 3

    Protein folding in 3D lattice HP model using a combining cuckoo search with the Hill-Climbing algorithms by Boumedine, Nabil, Bouroubi, Sadek

    Published in Applied soft computing (01-04-2022)
    “…A protein is a linear chain containing a set of amino acids, which folds on itself to create a specific native structure, called the minimum energy…”
    Get full text
    Journal Article
  4. 4

    A new ideal secret sharing scheme based on a tree by Meriem, Ghanem, Bouroubi, Sadek

    “…One of the methods used in order to protect a secret K is a secret sharing scheme. In this method, the secret K is distributed among a finite set of…”
    Get full text
    Journal Article
  5. 5

    A parallel MOEA with criterion-based selection applied to the Knapsack Problem by Kantour, Nedjmeddine, Bouroubi, Sadek, Chaabane, Djamel

    Published in Applied soft computing (01-07-2019)
    “…In this paper, we propose a parallel multiobjective evolutionary algorithm called Parallel Criterion-based Partitioning MOEA (PCPMOEA), with an application to…”
    Get full text
    Journal Article
  6. 6

    Rotating Disk Cryptosystem: RDC by Bouroubi, Sadek, Rezkallah, Louiza

    “…Cryptography is a hot and active topic, it plays a crucial role in many aspects nowadays, from internet banking and e-commerce to email and web-based business…”
    Get full text
    Journal Article
  7. 7

    Hybrid cuckoo search algorithm for the minimum dominating set problem by Zouilekh, Belkacem, Bouroubi, Sadek

    Published 28-06-2022
    “…The notions of dominating sets of graphs began almost 400 years ago with the game of chess, which sparked the analysis of dominating sets of graphs, at first…”
    Get full text
    Journal Article
  8. 8

    Protein folding simulations in the hydrophobic-polar model using a hybrid cuckoo search algorithm by Boumedine, Nabil, Bouroubi, Sadek

    Published 22-05-2021
    “…A protein is a linear chain containing a set of amino acids, which folds on itself to create a specific native structure, also called the minimum energy…”
    Get full text
    Journal Article
  9. 9

    An Improved Simulated Annealing Algorithm for Optimization of Protein Folding Problem by Boumedine, Nabil, Bouroubi, Sadek

    “…The biological functionality of a protein is determined by its specific native structure. The challenging task of determining the native structure of a protein…”
    Get full text
    Conference Proceeding
  10. 10

    Protein structure prediction in the HP model using scatter search algorithm by Nabil, Boumedine, Sadek, Bouroubi

    “…Predicting the 3D native structure of proteins using their amino acid sequences. The aim of PFP is to predict the best conformation of a given amino acid…”
    Get full text
    Conference Proceeding
  11. 11

    On new identities for Bell's polynomials by Abbas, Moncef, Bouroubi, Sadek

    Published in Discrete mathematics (06-04-2005)
    “…In this work, we propose two new methods for the determination of new identities for Bell's polynomials. The first method is based on the Lagrange inversion…”
    Get full text
    Journal Article Conference Proceeding
  12. 12

    An ideal hierarchical secret sharing scheme by Meriem, Ghanem, Sadek, Bouroubi

    Published 27-03-2020
    “…One of the methods used in order to protect a secret K is a secret sharing scheme. In this scheme the secret K is distributed among a finite set of…”
    Get full text
    Journal Article
  13. 13

    An unexpected meeting between the $P^{3}_{1}$-set and the cubic-triangular numbers by Bouroubi, Sadek, Debbache, Ali

    Published 30-01-2020
    “…A set of $m$ positive integers $\{x_{1},\ldots,x_{m}\}$ is called a $P^{3}_{1}$-set of size $m$ if the product of any three elements in the set increased by…”
    Get full text
    Journal Article
  14. 14

    A new hybrid genetic algorithm for protein structure prediction on the 2D triangular lattice by Boumedine, Nabil, Bouroubi, Sadek

    Published 08-07-2019
    “…The flawless functioning of a protein is essentially linked to its own three-dimensional structure. Therefore, the prediction of a protein structure from its…”
    Get full text
    Journal Article
  15. 15

    Cryptanalysis of Merkle-Hellman cipher using parallel genetic algorithm by Kantour, Nedjmeeddine, Bouroubi, Sadek

    Published 13-11-2017
    “…In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards. Two years later, an asymmetric…”
    Get full text
    Journal Article
  16. 16
  17. 17

    A Parallel MOEA with Criterion-based Selection Applied to the Knapsack Problem by Nedjmeddine, Kantour, Sadek, Bouroubi, Djamel, Chaabane

    Published 06-11-2018
    “…In this paper, we propose a parallel multiobjective evolutionary algorithm called Parallel Criterion-based Partitioning MOEA (PCPMOEA), with an application to…”
    Get full text
    Journal Article
  18. 18

    The Set Partitions: Solution for the sharing secret keys by Bouroubi, Sadek, Charchali, Fella, Tani, Nesrine Benyanhia

    Published 17-09-2013
    “…Confidentiality was and will always remain a critical need in the exchanges either between persons or the official parties. Recently, cryptology has made a…”
    Get full text
    Journal Article
  19. 19

    Connection between ordinary multinomials, generalized Fibonacci numbers, partial Bell partition polynomials and convolution powers of discrete uniform distribution by Belbachir, Hacene, Bouroubi, Sadek, Khelladi, Abdelkader

    Published 16-08-2007
    “…Using an explicit computable expression of ordinary multinomials, we establish three remarkable connections, with the q-generalized Fibonacci sequence, the…”
    Get full text
    Journal Article