Subject | English | Arabic |
comp., MS | asymmetric key algorithm | لوغاريتم المفاتيح غير المتماثلة (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
math. | BACON algorithm | خوارزمية بيكون BACON؛ مرشحات القيم الشاردة كفوءة الاحتساب ومكيفة القطع |
math. | data augmentation algorithm | خوارزمية ازدياد البيانات |
math. | Efron's self-consistency algorithm | خوارزمية إفرون المنسقة ذاتياً؛ مبدأ المعلومات المفقودة |
math. | EM algorithm | خوارزمية تعظيم - التقدير |
math. | estimation-maximisation algorithm | خوارزمية تعظيم - التقدير |
math. | estimation-maximization algorithm | خوارزمية تعظيم - التقدير |
math. | genetic algorithm | خوارزمية جينية |
comp., MS | hash algorithm | لوغاريتم التجزئة (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
math. | Metropolis-Hastings algorithm | خوارزمية متروبوليس - هاستنكس |
math. | Monte Carlo EM algorithm | خوارزمية مونت كارلو E M |
math. | peeling algorithm | خوارزمية التقشير |
auto.ctrl. | position algorithm | لوغاريتمي الوضع |
comp., MS | public key algorithm | خوارزمية المفتاح العمومي (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
math. | recursive algorithm | خوارزمية متكررة |
comp., MS | Secure Hash Algorithm 1 | لوغاريتم التجزئة الآمن 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |
math. | simplex algorithm | خوارزمية سمبلكس |
auto.ctrl. | velocity algorithm | لوغاريتم سرعة |
math. | Yates's algorithm | خوارزمية ييتس |