Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Naveed Ahmed Azam"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 1, Pp 219-236 (2023)
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks. However, generating S-boxes is computationally costly, and frequently generating them slows do
Externí odkaz:
https://doaj.org/article/d6b9006080c0448492d8fb7a7ea795bf
Autor:
Naveed Ahmed Azam, Jianshen Zhu, Yanming Sun, Yu Shi, Aleksandar Shurbevski, Liang Zhao, Hiroshi Nagamochi, Tatsuya Akutsu
Publikováno v:
Algorithms for Molecular Biology, Vol 16, Iss 1, Pp 1-39 (2021)
Abstract Analysis of chemical graphs is becoming a major research topic in computational molecular biology due to its potential applications to drug design. One of the major approaches in such a study is inverse quantitative structure activity/proper
Externí odkaz:
https://doaj.org/article/dda59fa0f87d4a0eb2218001f3f637aa
Enumerating Discrete Resonant Rossby/Drift Wave Triads and Their Application in Information Security
Publikováno v:
Mathematics, Vol 10, Iss 23, p 4395 (2022)
We propose a new parametrization of the resonant Rossby/drift wave triads to develop an algorithm to enumerate all resonant triads in a given grid of wavenumbers. To arrive at such a parametrization, we have employed tools from arithmetic/algebraic g
Externí odkaz:
https://doaj.org/article/371715add551491fbbce14bd211672b0
Autor:
Jianshen Zhu, Naveed Ahmed Azam, Kazuya Haraguchi, Liang Zhao, Hiroshi Nagamochi, Tatsuya Akutsu
Publikováno v:
Frontiers in Bioscience-Landmark, Vol 27, Iss 6, p 188 (2022)
Background: Drug design is one of the important applications of biological science. Extensive studies have been done on computer-aided drug design based on inverse quantitative structure activity relationship (inverse QSAR), which is to infer chemica
Externí odkaz:
https://doaj.org/article/c4d5b2d8c8264ab3baac7b57322ebbd0
Publikováno v:
Entropy, Vol 24, Iss 5, p 571 (2022)
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography because it provides high security with a relatively smaller key size when compared with well-known cryptosystems. Recently, it has been shown that the cryptosy
Externí odkaz:
https://doaj.org/article/8cb2072c3c3a407bb1940786ef83fcc8
Publikováno v:
Entropy, Vol 22, Iss 11, p 1295 (2020)
Cycle rank is an important notion that is widely used to classify, understand, and discover new chemical compounds. We propose a method to enumerate all non-isomorphic tree-like graphs of a given cycle rank with self-loops and no multiple edges. To a
Externí odkaz:
https://doaj.org/article/c8a98f2a2f1c46f9ae7255aa2ad4c692
Publikováno v:
Entropy, Vol 22, Iss 9, p 923 (2020)
Graph enumeration with given constraints is an interesting problem considered to be one of the fundamental problems in graph theory, with many applications in natural sciences and engineering such as bio-informatics and computational chemistry. For a
Externí odkaz:
https://doaj.org/article/d855e9e53231427e8bf8cbd171430580
Autor:
Syed Azmat Hussain, Tariq Shah, Naveed Ahmed Azam, Antonio Aparecido de Andrade, Aqdas Naveed Malik
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 10 (2014)
Cognitive radio is a growing zone in wireless communication which offers an opening in complete utilization of incompetently used frequency spectrum: deprived of crafting interference for the primary (authorized) user, the secondary user is indorsed
Externí odkaz:
https://doaj.org/article/88d1d19e5b82465f9748913422b1a967
Publikováno v:
Information Sciences. 631:164-184
Publikováno v:
Computers, Materials & Continua. 71:4971-4988