Search Results - data distribution ((rsa algorithm) OR (force algorithm))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  3. 3

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design and development of prototype robot gripper for object weight measurement by Almassri, Ahmed M. M.

    Published 2014
    “…The proposed work also includes the development of new algorithm for data extraction and signal conditioning analysis that will be loaded into the microcontroller system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing clustering algorithm with initial centroids in tool wear region recognition by Kasim, Nur Adilla, Nuawi, Mohd Zaki, Abdul Ghani, Jaharah, Ngatiman, Nor Azazi, Che Haron, Che Hassan, Muhammad Rizal

    Published 2020
    “…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Digital economy tax compliance model in Malaysia using machine learning approach by Raja Azhan Syah Raja Wahab, Azuraliza Abu Bakar

    Published 2021
    “…We conduct descriptive analytics to explore and extract a summary of data for initial understanding. Through a brief description of the descriptive model, the data distribution in a histogram shows that the information extracted can give a clear picture in influencing the results to classify digital economic tax compliance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…By using the daily observed data, ANN can map the relationship between rainfall-runoff. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20