Search Results - (( data distribution ((rsa algorithm) OR (bat algorithm)) ) OR ( _ evaluation based algorithm ))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  3. 3

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…After testing and evaluation the prototype, the result shows that the Sudoku generator based on hybrid algorithm takes more times on solving the Sudoku. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions by Badaruddin, Muhammad, Zuwairie, Ibrahim, Kamarul Hawari, Ghazali, Mohd Riduwan, Ghazali, Kian, Sheng Lim, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz, Marizan, Mubin, Norrima, Mokhtar

    Published 2014
    “…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique by Aljanaby, Alaa, Ku-Mahamud, Ku Ruhana, Md Norwawi, Norita

    Published 2008
    “…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility by Roshahliza, M. Ramli, Salina, Abdul Samad, Noor, Ali O. Abid

    Published 2018
    “…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic by Yap, Soon Teck, Othman, Mohamed

    Published 2004
    “…Confidence-based Q (CQ) Routing Algorithm is an adaptive network routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The evaluation found that FA2 algorithm when combined with MC algorithm produce the best network representation for SAGA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
    Get full text
    Get full text
    Thesis