Search Results - _ distribution ((((rsa algorithm) OR (force algorithm))) OR (tree algorithm))
Search alternatives:
- force algorithm »
- tree algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
3
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Winsorize tree algorithm for handling outliers in classification problem
Published 2016“…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimum MV Feeder Routing and Substation siting and rating in Distribution Network
Published 2014“…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…In this paper, an optimized Levy Flight algorithm known as a Distributed Levy Flight (DLF) for swarm agents is proposed. …”
Get full text
Get full text
Get full text
Article -
9
Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm
Published 2017“…This braking force distribution affects vehicles stability while braking. …”
Get full text
Get full text
Thesis -
10
Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.]
Published 2018“…This study presents a genetic algorithm brake force distribution strategy to increase energy recovery, considering the Economic Commission for Europe (ECE) regulations. …”
Get full text
Get full text
Article -
11
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
13
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
14
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
15
Delineating mangrove forest zone using spectral reflectance
Published 2020“…By using geospatial techniques and remotely sensed imagery data, the distribution of mangrove tree species associating with anthropogenic matrix can clearly be identified and mapped. …”
Get full text
Get full text
Thesis -
16
Designing of disparity map based on hierarchical dynamic programming using satellite stereo imagery
Published 2023Conference Paper -
17
-
18
-
19
-
20
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis
