Search Results - (( based application _ algorithm ) OR ( some application ((rsa algorithm) OR (based algorithm)) ))*
Search alternatives:
- based application »
- some application »
- rsa algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
3
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
4
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…To enhance the selection of most highly ranking features, irrelevant features are ‘pruned’ based on determined boundary threshold. In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. …”
Get full text
Get full text
Thesis -
5
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
On density-based data streams clustering algorithms: A survey
Published 2017“…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
10
A priority based job scheduling algorithm in cloud computing
Published 2012“…The proposed algorithm is based on multiple criteria decision making model.…”
Get full text
Get full text
Conference or Workshop Item -
11
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
14
A block-based multi-scale background extraction algorithm
Published 2010“…In addition, an amended multi-scale algorithm is introduced. This algorithm is a hybrid algorithm, a combination of some nonparametric and parametric filters. …”
Get full text
Get full text
Article -
15
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Simulated Kalman Filter: A Novel Estimation-based Metaheuristic Optimization Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
