ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Technology
Research
Biology
Economy
Languages
Literature
Architecture and Urbanism
Sports
Public health
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
Poland
Canada
South Africa
Turkey, Turkish Republic
Argelia
Italy
all records (71)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
20.632  Articles
1 of 2.064 pages  |  10  records  |  more records»
As a part of their simulation work, random numbers are usually generated by computers. The purpose of this work is to test and verify the randomness of the so-called random generator so that it can be used in simulation runs. Additionally, in this study, ... see more

SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers. In these ciphers, different blocks were encrypted by the different keys, but all block keys wer... see more

For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution. In this paper, we perform a detailedstatistical analy... see more

We analyze the impact of the most recent global financial crisis (GFC) on the seven most important Latin American stock markets. Our mean-variance analysis shows that the markets are significantly less volatile and, in general, investors prefer to invest ... see more

Objective Badminton four-corner running practice with change of direction commonly includes fix route and random route. However, the study of the energy contributions characteristics of these two training methods was very limited. The aim of this study wa... see more

In this work, we propose a new statistical randomness test, the Saturation Point Test, which can be applied to integer sequences as well as binary sequences and is designed to increase the number of tests for short sequences. The subject of Saturation Poi... see more

The random key plays a basic role in the design of any cryptographic algorithms. In this paper, a proposed model for generating a random key is presented, which will be used for security purposes. Chicken swarm optimization (CSO) and HTML parser are used ... see more

Security concepts are frequently used interchangeably. These concepts are interrelated and share similar objectives for the protection of privacy, credibility, and access to information; however, there are some slight differences between them. Such variat... see more

The random key plays a basic role in the design of any cryptographic algorithms. In this paper, a proposed model for generating a random key is presented, which will be used for security purposes. Chicken swarm optimization (CSO) and HTML parser are used ... see more

1 of 2.064 pages  |  10  records  |  more records»