Search Results - (( a distribution ((rsa algorithm) OR (based algorithm)) ) OR ( pre evaluation a algorithm ))
Search alternatives:
- a distribution »
- pre evaluation »
- rsa algorithm »
- evaluation a »
- a algorithm »
-
1
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…The accuracy of ESL depends on all the stages of data processing including: head model reconstruction, signal pre-processing and inverse solution. Therefore, a standardized algorithm with less supervision is desired to utilize ESL for pre-surgical evaluation. …”
Get full text
Get full text
Thesis -
2
-
3
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
4
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The DPA-EHD is further modified by utilizing the pipelining parallelism to reduce the computing iterations and named as data parallel and pipelining algorithm (DPPA-EHD). To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
5
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid
Published 2023“…In addition, the solutions have been evaluated based on pre-defined performance metrics and the outcomes of the optimization framework were compared with the other existing optimization techniques to evaluate the potency and the productivity of the developed MLPSO algorithm. …”
text::Thesis -
7
Development of an effective clustering algorithm for older fallers
Published 2022“…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
Get full text
Get full text
Article -
8
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
9
A Study of Automated Essay Scoring Frameworks on Evaluating Malaysian University English Test Essays Based on Syntactic and Semantic Features
Published 2023“…An Automated Essay Scoring (AES) system can use a trained computational model to evaluate an essay as close to the grade that a human rater would assign. …”
Get full text
Get full text
Get full text
Thesis -
10
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…VL-WIDE has accomplished a higher median value for the domination over state-of-the-art algorithms with a higher number of non- dominated solutions value than all other benchmarks. …”
Get full text
Get full text
Thesis -
11
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Six machine learning algorithms were applied and compared based on the classification evaluation methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
13
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
14
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
15
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
Get full text
Get full text
Thesis -
16
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Uncertainty estimation for improving accuracy of non-rigid registration in cardiac images
Published 2015“…In other words, uncertainty estimation is used to evaluate the registration algorithm performance which integrates intensity-based and feature-based methods. …”
Get full text
Get full text
Get full text
Book Section -
18
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
19
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
20
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…In order to evaluate our proposed security framework based on MAS architecture, a pre-survey is conducted using a questionnaire survey. …”
Get full text
Get full text
Thesis
