Search Results - (( data distribution rsa algorithm ) OR ( _ validation ((new algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  3. 3

    A New Bats Echolocation-based Algorithm for Single Objective Optimisation by N. M., Yahya, Tokhi, M. Osman, Kasdirin, Hyreil Anuar

    Published 2016
    “…With this in mind, an adaptive bats sonar algorithm is introduced with new paradigms of real bats echolocation behaviour. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…Validation of the proposed algorithm (MR-CSA) was based on comparison of its performance with the performance of the centralized pairing algorithm while the proposed MR-DSA algorithm was validated through comparing its performance against that of the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of throughput and the average packet throughput. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The use of the BOGSA algorithm aims to create a new equation for the calculation of the masses of population individuals, as found in the theoretical work in the Strength Pareto Evolutionary Algorithm two (SPEAII) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The experimental results show that combining the advantages of the geometric based validation and contrast based filtering as well as avoiding large quantization errors, lead to significant enhancement in the performance of the seed point detection algorithm in terms of balancing between the precision and recall. …”
    Get full text
    Get full text
    Thesis
  10. 10

    New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions by Mahmod Mohammad Altwallbah, Neda, Mohd Radzi, Mohd Amran, Azis, Norhafiz, Shafie, Suhaidi, Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2022
    “…The new algorithm allows the search to continue until the extremum maximum is identified among numerous local maximums, rather than being imprisoned at one of the local maximums as is the case with the standard algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Therefore, this thesis proposed a new two phase algorithm based on March tests to specifically distinguish the two faults. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…Froth segmentation is a useful procedure that can determine the bubble size distribution. Several algorithms have been proposed in this field, but marker-based watershed transform shows the best performance. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Evaluation of these algorithms showed that the results are unsatisfactory due to the lower validity and accuracy of these algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Thirdly, the thesis validates the algorithm's performance on standard constrained single objective and multi objective benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A New Unsupervised Validation Index Model Suitable for Energy-Efficient Clustering Techniques in VANET by Abdulrazzak H.N., Hock G.C., Mohamed Radzi N.A., Tan N.M.L.

    Published 2024
    “…Clustering evaluation techniques are important to check the clustering algorithm quality. High cluster similarity help to reduce the distance between a node to node within the cluster, also good separation was more important to avoid overlapping clusters. …”
    Article
  20. 20

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. …”
    Get full text
    Get full text
    Thesis