Search Results - (( key selection process algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- process algorithm »
- implication based »
- java implication »
- key selection »
-
1
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The selection algorithms can perform multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
Get full text
Get full text
Thesis -
2
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…The selection algorithm can performs multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
Get full text
Get full text
Conference or Workshop Item -
3
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The selection algorithm can performs multiple selections concurrently to find multiple target keys with different predefined target ranks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
6
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
8
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. Loo et. al. (2002) has proposed a statistical selection algorithm with the same objective and run in multicast / broadcast environment that has been proved that it is the best among others in terms of the number of messages needed to complete the searching process. …”
Get full text
Get full text
Get full text
Article -
9
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
10
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Since the key exchange process is successful, we think the offered methods are effective.…”
Get full text
Get full text
Student Project -
11
Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm
Published 2019“…Due to natural selection of GA process, the generated key is found to be the most random and non-repeating as possible. …”
Get full text
Get full text
Get full text
Article -
12
A decision support system using Neurofuzzy algorithm methods in selecting lecturer's teaching work load for bachelor in multimedia / Asmaa Musa
Published 2007“…A key stage in the system process is the selection of features. …”
Get full text
Get full text
Thesis -
13
-
14
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Published 2021“…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
Get full text
Get full text
Get full text
Article -
15
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…A compensation algorithm is implemented to reduce the problem of missing and distorted sort keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
Get full text
Get full text
Article -
17
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…The model performance experiences a significant boost through the GA-optimised feature selection by reducing computational complexity and improving key metrics such as accuracy, precision and F1-score. …”
Get full text
Get full text
Get full text
Article -
18
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Normal Correlation (NC), Modified Principal Component Analysis (PCA) and Partial Correlation Analysis (PCorrA) are used to develop the correlation coefficients between selected key process variables and quality variables of interest. …”
Get full text
Get full text
Monograph -
19
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
Get full text
Get full text
Get full text
Article -
20
A Framework of Rough Reducts Optimization Based on PSO/ACO Hybridized Algorithms
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
