Search Results - (( _ distribution ((rsa algorithm) OR (bat algorithm)) ) OR ( based evaluation study algorithm ))
Search alternatives:
- based evaluation »
- evaluation study »
- rsa algorithm »
- bat algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
An improved bat algorithm with artificial neural networks for classification problems
Published 2016“…Therefore, in order to improve the exploration and exploitation behavior of bats, this research proposed an improved Bat with Gaussian Distribution (BAGD) algorithm that takes small step lengths and ensures convergence to global optima. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
4
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
Get full text
Get full text
Get full text
Article -
5
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Performance analysis of distributed power flow controller with ultra-capacitor for regulating the frequency deviations in restructured power system
Published 2020“…An innovative metaheuristic method called bat algorithm (BA) is used to ascertain the optimal gain parameters of the two degree of freedom (2DOF) controllers using an integral squared error (ISE) criteria. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Performance analysis of distributed power flow controller with ultracapacitor for regulating the frequency deviations in restructured power system
Published 2020“…An innovative metaheuristic method called bat algorithm (BA) is used to ascertain the optimal gain parameters of the two degree of freedom (2DOF) controllers using an integral squared error (ISE) criteria. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Streamflow prediction with large climate indices using several hybrid multilayer perceptrons and copula Bayesian model averaging
Published 2023“…Climate models; Flood control; Floods; Forecasting; Information management; Inverse problems; Mean square error; Multilayer neural networks; Multilayers; Normal distribution; Particle swarm optimization (PSO); Reservoir management; Reservoirs (water); Risk management; Rivers; Stream flow; Uncertainty analysis; Bat algorithms; Bayesian model averaging; Bayesian modelling; Copula bayesian model; Gamma test; Inclusive multiple model; Multilayers perceptrons; Multiple-modeling; Natural hazard; Optimization algorithms; Bayesian networks; flood; flood control; North Atlantic Oscillation; perception; reservoir; streamflow; uncertainty analysis; Kelantan; Malaysia; West Malaysia…”
Article -
11
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…Random Sequential Adsorption (RSA) is integrated with quaternion mathematics to achieve dense, yet random, fiber packing. …”
Get full text
Get full text
Get full text
Article -
12
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
13
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…In addition, the weight of importance is critical for evaluating the performance of MaOO algorithms. All evaluation studies for MaOO algorithms have ignored to assign such weight for the target criteria during evaluation process. …”
Get full text
Get full text
Thesis -
14
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…The preliminary results show that remarkable studies were reported without considering performance metrics for the purpose of algorithm evaluation. …”
Get full text
Get full text
Article -
15
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
16
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
Get full text
Get full text
Get full text
Thesis -
17
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…Therefore, for a new document, evaluation of algorithms is ineluctable. The study also proposed a simple but reliable cluster evaluation metric called NPL-C metric. …”
Get full text
Get full text
Get full text
Thesis -
19
Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders based on WFG Test Functions
Published 2014“…In this study, a more complex benchmark datasets called WFG, is considered for the evaluation of VEPSO, VEPSOnds, and VEPSOml algorithms.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis
