Search Results - (( music selection method algorithm ) OR ( based information rsa algorithm ))
Search alternatives:
- based information »
- selection method »
- method algorithm »
- music selection »
- information rsa »
- rsa algorithm »
-
1
-
2
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
3
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
4
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
5
New directions in factoring the prime power RSA modulus N = prq
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
7
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…RSA is one public key Cryptosystem to secure information and communication from third parties and it can be factor by user authentication. …”
Get full text
Get full text
Student Project -
9
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
10
Content-based feature selection for music genre classification
Published 2022“…Besides the selection process, two modules of Negative Selection Algorithm; censoring and monitoring are highlighted as well in this work. …”
Get full text
Get full text
Get full text
Article -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
12
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This method proves to be effective by systematically exploring and generating a variety of musical ideas through iterative applications of selection, crossover, and mutation genetic operations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Extending LSB-based partial key exposure to RSA with special-structured primes
Published 2026“…Previous studies have shown that RSA becomes vulnerable when its prime factors follow special algebraic structures or when partial information about their least significant bits (LSBs) is exposed. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
Get full text
Get full text
Undergraduates Project Papers -
16
A hybrid approach to traditional Malay music genre classification: combining feature selection and artificial immune recognition system
Published 2008“…The new version of AIRS is used in this study. In Proposed algorithm, the resource allocation method of AIRS has been changed with a nonlinear method. …”
Get full text
Get full text
Conference or Workshop Item -
17
Artificial immune recognition system with nonlinear resource allocation method and application to traditional Malay music genre classification
Published 2008“…This new algorithm, AIRS with nonlinear resource allocation method, was used as a classifier in Traditional Malay Music (TMM) genre classification. …”
Get full text
Get full text
Conference or Workshop Item -
18
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
19
Lattice-based cryptography: the dots that provide information security
Published 2023“…Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
Get full text
Get full text
Thesis
