Search Results - a distribution ((((rsa algorithm) OR (force algorithm))) OR (tree algorithm))
Search alternatives:
- force algorithm »
- a distribution »
- tree algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…We measured the performance of four encryption algorithms (DES, 3DES, AES, and RSA) of our prototype distributed MES system. 256-bit symmetric keys are equivalent in strength to 15380-bit RSA keys. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
3
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Encryption is the one of the most secured way using prevent unauthorized access. Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Winsorize tree algorithm for handling outliers in classification problem
Published 2016“…Some researchers opt to perform pre-pruning or post-pruning of the CART in handling the outliers. This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Optimum MV Feeder Routing and Substation siting and rating in Distribution Network
Published 2014“…This paper proposes an evolutionary algorithm to determine the optimum distribution substation placement and sizing by using the particle swarm optimization algorithm and optimum feeder routing using modified minimum spanning tree algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
8
Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm
Published 2017“…There are different algorithms used as a regenerative braking strategy. …”
Get full text
Get full text
Thesis -
9
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…In this paper, an optimized Levy Flight algorithm known as a Distributed Levy Flight (DLF) for swarm agents is proposed. …”
Get full text
Get full text
Get full text
Article -
10
Improving regenerative braking strategy using genetic algorithm for electric vehicles / H. Taleghani ... [et al.]
Published 2018“…This study presents a genetic algorithm brake force distribution strategy to increase energy recovery, considering the Economic Commission for Europe (ECE) regulations. …”
Get full text
Get full text
Article -
11
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…The field of quantum cryptography on the other hand is providing the needed highly secure keys through the introduction of quantum key distribution QKD when the quantum computing becomes a reality. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
13
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006“…We implemented Useful-Skew Tree (UST) algorithm which is based on the deferred-merge embedding (DME) paradigm, as the clock layout synthesis engine. …”
Get full text
Get full text
Article -
14
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
15
Designing of disparity map based on hierarchical dynamic programming using satellite stereo imagery
Published 2023Conference Paper -
16
Delineating mangrove forest zone using spectral reflectance
Published 2020“…Overall, the spectral reflectance measurement pairing with leaf chlorophyll measurement provides a sound basis for classifying mangrove tree species (R2>80%). …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
20
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…Then we compare our algorithm with brute force method. Result from simulation it shows that proposed algorithm successfully distribute and execute job based on thermal constraints in an effective and efficient way compare to brute force method. …”
Get full text
Get full text
Conference or Workshop Item
