Search Results - (( _ application ((amh algorithm) OR (means algorithm)) ) OR ( code application rsa algorithm ))*
Search alternatives:
- code application »
- means algorithm »
- application rsa »
- amh algorithm »
- rsa algorithm »
-
1
Extensions to the K-AMH algorithm for numerical clustering
Published 2018Get full text
Get full text
Get full text
Article -
2
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…Out of six data sets, the &-AMH algorithm obtained the highest mean accuracy scores for the five data sets and one data set was at equal performance. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
5
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
Get full text
Get full text
Thesis -
7
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
8
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
9
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
10
-
11
A novel quantum calculus-based complex least mean square algorithm (q-CLMS)
Published 2022“…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
Get full text
Get full text
Article -
12
A novel quantum calculus-based complex least mean square algorithm (q-CLMS)
Published 2022“…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
Get full text
Get full text
Article -
13
A novel quantum calculus-based complex least mean square algorithm (q-CLMS)
Published 2023“…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
Get full text
Get full text
Article -
14
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
-
17
-
18
-
19
Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid
Published 2006“…In this paper, we combine Fuzzy C-Mean and Genetic Algorithms which are popular algorithms, the Grid can be used for scheduling. …”
Get full text
Get full text
Article -
20
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…To address these problems, a novel method combining a covering rough set and a K-Means clustering algorithm (RK-Means) was proposed in this paper. …”
Article
