Search Results - "Bouroubi, Sadek"
-
1
Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
Published in Mobile networks and applications (01-02-2020)“…In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards. Two years later, an asymmetric…”
Get full text
Journal Article -
2
A hybrid population-based algorithm for solving the Minimum Dominating Set Problem
Published in Croatian operational research review (2024)“…The Minimum Dominating Sets (MDS) problem is pivotal across diverse fields like social networks and ad hoc wireless networks, representing a significant…”
Get full text
Journal Article -
3
Protein folding in 3D lattice HP model using a combining cuckoo search with the Hill-Climbing algorithms
Published in Applied soft computing (01-04-2022)“…A protein is a linear chain containing a set of amino acids, which folds on itself to create a specific native structure, called the minimum energy…”
Get full text
Journal Article -
4
A new ideal secret sharing scheme based on a tree
Published in Journal of discrete mathematical sciences & cryptography (01-01-2023)“…One of the methods used in order to protect a secret K is a secret sharing scheme. In this method, the secret K is distributed among a finite set of…”
Get full text
Journal Article -
5
A parallel MOEA with criterion-based selection applied to the Knapsack Problem
Published in Applied soft computing (01-07-2019)“…In this paper, we propose a parallel multiobjective evolutionary algorithm called Parallel Criterion-based Partitioning MOEA (PCPMOEA), with an application to…”
Get full text
Journal Article -
6
Rotating Disk Cryptosystem: RDC
Published in Journal of information & optimization sciences (03-07-2020)“…Cryptography is a hot and active topic, it plays a crucial role in many aspects nowadays, from internet banking and e-commerce to email and web-based business…”
Get full text
Journal Article -
7
Hybrid cuckoo search algorithm for the minimum dominating set problem
Published 28-06-2022“…The notions of dominating sets of graphs began almost 400 years ago with the game of chess, which sparked the analysis of dominating sets of graphs, at first…”
Get full text
Journal Article -
8
Protein folding simulations in the hydrophobic-polar model using a hybrid cuckoo search algorithm
Published 22-05-2021“…A protein is a linear chain containing a set of amino acids, which folds on itself to create a specific native structure, also called the minimum energy…”
Get full text
Journal Article -
9
An Improved Simulated Annealing Algorithm for Optimization of Protein Folding Problem
Published in 2020 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH) (09-02-2021)“…The biological functionality of a protein is determined by its specific native structure. The challenging task of determining the native structure of a protein…”
Get full text
Conference Proceeding -
10
Protein structure prediction in the HP model using scatter search algorithm
Published in 2020 4th International Symposium on Informatics and its Applications (ISIA) (15-12-2020)“…Predicting the 3D native structure of proteins using their amino acid sequences. The aim of PFP is to predict the best conformation of a given amino acid…”
Get full text
Conference Proceeding -
11
On new identities for Bell's polynomials
Published in Discrete mathematics (06-04-2005)“…In this work, we propose two new methods for the determination of new identities for Bell's polynomials. The first method is based on the Lagrange inversion…”
Get full text
Journal Article Conference Proceeding -
12
An ideal hierarchical secret sharing scheme
Published 27-03-2020“…One of the methods used in order to protect a secret K is a secret sharing scheme. In this scheme the secret K is distributed among a finite set of…”
Get full text
Journal Article -
13
An unexpected meeting between the $P^{3}_{1}$-set and the cubic-triangular numbers
Published 30-01-2020“…A set of $m$ positive integers $\{x_{1},\ldots,x_{m}\}$ is called a $P^{3}_{1}$-set of size $m$ if the product of any three elements in the set increased by…”
Get full text
Journal Article -
14
A new hybrid genetic algorithm for protein structure prediction on the 2D triangular lattice
Published 08-07-2019“…The flawless functioning of a protein is essentially linked to its own three-dimensional structure. Therefore, the prediction of a protein structure from its…”
Get full text
Journal Article -
15
Cryptanalysis of Merkle-Hellman cipher using parallel genetic algorithm
Published 13-11-2017“…In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards. Two years later, an asymmetric…”
Get full text
Journal Article -
16
On the poset of partitions of an integer
Published in Electronic notes in discrete mathematics (01-10-2006)Get full text
Journal Article -
17
A Parallel MOEA with Criterion-based Selection Applied to the Knapsack Problem
Published 06-11-2018“…In this paper, we propose a parallel multiobjective evolutionary algorithm called Parallel Criterion-based Partitioning MOEA (PCPMOEA), with an application to…”
Get full text
Journal Article -
18
The Set Partitions: Solution for the sharing secret keys
Published 17-09-2013“…Confidentiality was and will always remain a critical need in the exchanges either between persons or the official parties. Recently, cryptology has made a…”
Get full text
Journal Article -
19
Connection between ordinary multinomials, generalized Fibonacci numbers, partial Bell partition polynomials and convolution powers of discrete uniform distribution
Published 16-08-2007“…Using an explicit computable expression of ordinary multinomials, we establish three remarkable connections, with the q-generalized Fibonacci sequence, the…”
Get full text
Journal Article