Search Results - (( _ distribution ((rsa algorithm) OR (bat algorithm)) ) OR ( model evaluation study algorithm ))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    An improved bat algorithm with artificial neural networks for classification problems by Rehman Gillani, Syed Muhammad Zubair

    Published 2016
    “…Therefore, in order to improve the exploration and exploitation behavior of bats, this research proposed an improved Bat with Gaussian Distribution (BAGD) algorithm that takes small step lengths and ensures convergence to global optima. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  4. 4

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Performance analysis of distributed power flow controller with ultra-capacitor for regulating the frequency deviations in restructured power system by Peddakapu, K., M. R., Mohamed, Mohd Herwan, Sulaiman, P., Srinivasarao, A. S., Veerendra, P. K., Leung

    Published 2020
    “…An innovative metaheuristic method called bat algorithm (BA) is used to ascertain the optimal gain parameters of the two degree of freedom (2DOF) controllers using an integral squared error (ISE) criteria. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Performance analysis of distributed power flow controller with ultracapacitor for regulating the frequency deviations in restructured power system by Peddakapu, K., M. R., Mohamed, M. H., Sulaiman, Srinivasarao, P., Veerendra, A. S., Leung, P. K.

    Published 2020
    “…An innovative metaheuristic method called bat algorithm (BA) is used to ascertain the optimal gain parameters of the two degree of freedom (2DOF) controllers using an integral squared error (ISE) criteria. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Practical considerations on Quantum Key Distribution (QKD) by Al-Khateeb, Wajdi Fawzi Mohammed, Al-Khateeb, Khalid A. Saeed, Ahmad, Nur Elyana, Mohd Salleh, Siti Norussaadah

    Published 2013
    “…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall by Mustafa, M.R., Rezaur, R.B., Saiedi, Saied, Rahardjo, H., Isa, M.H.

    Published 2013
    “…Knowledge of pore-water pressure responses to rainfall is vital in slope failure and slope hydrological studies. The performance of four artificial neural network (ANN) training algorithms was evaluated to identify the training algorithm appropriate for modeling the dynamics of soil pore-water pressure responses to rainfall patterns using multilayer perceptron (MLP) ANN. …”
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market by Hazirah Halul

    Published 2024
    “…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
    thesis::master thesis
  12. 12

    Streamflow prediction with large climate indices using several hybrid multilayer perceptrons and copula Bayesian model averaging by Panahi F., Ehteram M., Ahmed A.N., Huang Y.F., Mosavi A., El-Shafie A.

    Published 2023
    “…Climate models; Flood control; Floods; Forecasting; Information management; Inverse problems; Mean square error; Multilayer neural networks; Multilayers; Normal distribution; Particle swarm optimization (PSO); Reservoir management; Reservoirs (water); Risk management; Rivers; Stream flow; Uncertainty analysis; Bat algorithms; Bayesian model averaging; Bayesian modelling; Copula bayesian model; Gamma test; Inclusive multiple model; Multilayers perceptrons; Multiple-modeling; Natural hazard; Optimization algorithms; Bayesian networks; flood; flood control; North Atlantic Oscillation; perception; reservoir; streamflow; uncertainty analysis; Kelantan; Malaysia; West Malaysia…”
    Article
  13. 13

    Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method by Mohammed, Rawia Tahrir, Yaakob, Razali, Mohd Sharef, Nurfadhlina, Abdullah, Rusli

    Published 2021
    “…Thus, unify a set of most suitable evaluation criteria of the MaOO is needed. This study proposed a distinct unifying model for the MaOO evaluation criteria using the fuzzy Delphi method. …”
    Get full text
    Get full text
    Article
  14. 14

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…To evaluate the model, the model accuracy, precision, recall, F1- score, and confusion matrix were used. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting by HASSAN, SAIMA

    Published 2013
    “…In this study an ensemble of 100 NN models are constructed with a heterogeneous architecture. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network by Adam, A., Ibrahim, Z., Mokhtar, N., Shapiai, M.I., Mubin, M.

    Published 2016
    “…This study evaluates the performance of eye blink EEG signal peak detection algorithm for four different peak models which are Dumpala's, Acir's, Liu's, and Dingle's peak models. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH by Siti Roslindar, Yaziz, Roslinazairimah, Zakaria

    Published 2018
    “…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis