Search Results - (( same rsa algorithm ) OR ( same tree algorithm ))
Search alternatives:
- tree algorithm »
- rsa algorithm »
- same rsa »
-
1
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
2
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Therefore, the aim of this study is to analyze and implement a new cryptosystem which is more secure than RSA, LUC and LUC3 cryptosystem for same bit of keys. …”
Get full text
Get full text
Thesis -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
4
On (unknowingly) using near-square RSA primes
Published 2022“…We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.…”
Get full text
Get full text
Article -
5
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
7
Classification of fault and stray gassing in transformer by using duval pentagon and machine learning algorithms
Published 2022“…The algorithms that will be used include boosted trees, RUS boosted trees and subspace KNN, which belongs to the same ensemble group. …”
Get full text
Get full text
Article -
8
-
9
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis -
10
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012“…The algorithms transform the XML tree into a compact global tree called CGTree, and select the MCCTree from the CGTree. …”
Get full text
Get full text
Get full text
Article -
11
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…ID3 has the most advantages among the three algorithms, especially in processing time, as it builds the fastest tree with short depth. …”
Get full text
Get full text
Thesis -
12
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…In conclusion, the hybrid algorithm based solution strategies improved efficiency with convincing results, therefore, this will assist planners for better decision making to optimize area to achieve more trees to be planted. …”
Get full text
Get full text
Thesis -
13
Optimizing B-tree search performance of big data sets / Mohsen Marjani
Published 2017“…Repetition of search tasks for later queries with same or overlap conditions causes repeating same algorithmic traverse and consuming same resources including time and computation power in order to retrieve the result of the search process. …”
Get full text
Get full text
Get full text
Thesis -
14
Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac)
Published 2014“…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
Get full text
Get full text
Thesis -
15
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Decision tree-based approach for online management of PEM fuel cells for residential application
Published 2004“…In this research, a Decision Tree (DT) algorithm is employed to obtain the optimal, or quasioptimal, settings of the fuel cell online and in a general framework. …”
Get full text
Get full text
Thesis -
17
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…This study recommends a selection trade-off as the function of prediction efficiency and efficacy of the algorithm. Particularly, the proposed optimized Bagged Trees are the most effective algorithm for energy demand prediction applications, and the proposed optimized Medium Trees are the most efficient algorithm for real-time systems. …”
Get full text
Get full text
Thesis -
18
Decision tree-based approach for online management of pem fuel cells for residential application
Published 2004“…In this research, a Decision Tree (DT) algorithm was employed to obtain the optimal, or quasi-optimal, settings of the fuel cell online and in a general framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…For a smaller key size, ECC is able to provide the same level of security with RSA. This feature made ECC one of the most popular PKC algorithms today. …”
Get full text
Get full text
Thesis -
20
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Those processes constructed MCCTreeGenerator algorithm which will produce the same subtree as MCCTree but difference in its structure. …”
Get full text
Get full text
Thesis
