Search Results - _ distribution ((((rsa algorithm) OR (force algorithm))) OR (tree algorithm))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  3. 3

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Winsorize tree algorithm for handling outliers in classification problem by Ch’ng, Chee Keong

    Published 2016
    “…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimum MV Feeder Routing and Substation siting and rating in Distribution Network by Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Gan, Chin Kim

    Published 2014
    “…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Cooperative source detection using an optimized distributed levy flight algorithm by Ab.Majid, Mad Helmi, Arshad, Mohd Rizal, Yahya, Mohd Faid

    Published 2023
    “…In this paper, an optimized Levy Flight algorithm known as a Distributed Levy Flight (DLF) for swarm agents is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…This braking force distribution affects vehicles stability while braking. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.] by Taleghani, H., Hassan, M.K, Abdul Rahman, R. Z., Che Soh, A.

    Published 2018
    “…This study presents a genetic algorithm brake force distribution strategy to increase energy recovery, considering the Economic Commission for Europe (ECE) regulations. …”
    Get full text
    Get full text
    Article
  11. 11

    Practical considerations on Quantum Key Distribution (QKD) by Al-Khateeb, Wajdi Fawzi Mohammed, Al-Khateeb, Khalid A. Saeed, Ahmad, Nur Elyana, Mohd Salleh, Siti Norussaadah

    Published 2013
    “…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Nano-scale VLSI clock routing module based on useful-skew tree algorithm by Eik Wee, Chew, Heng Sun, Ch'ng, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
    Get full text
    Get full text
    Article
  15. 15

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…By using geospatial techniques and remotely sensed imagery data, the distribution of mangrove tree species associating with anthropogenic matrix can clearly be identified and mapped. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis