Search Results - data distribution ((rsa algorithm) OR (force algorithm))
Search alternatives:
- data distribution »
- force algorithm »
- rsa algorithm »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The second component is asymmetric encryption (RSA) with client’s key pair generator. This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
3
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. Its help to build a new trusted cloud computing environment. …”
Get full text
Get full text
Get full text
Article -
4
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
5
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
Get full text
Get full text
Thesis -
6
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
Get full text
Get full text
Thesis -
7
Design and development of prototype robot gripper for object weight measurement
Published 2014“…The proposed work also includes the development of new algorithm for data extraction and signal conditioning analysis that will be loaded into the microcontroller system. …”
Get full text
Get full text
Thesis -
8
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…It is embedded with a new tactic to recapture the K value and new initial seedings computation to kick off the system until it converges. Force components of cutting force Fc, thrust force Ft and perpendicular cutting force Fcn were extracted from Neo-MoMac cutting force measurement device. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
Get full text
Get full text
Thesis -
15
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
Get full text
Get full text
Thesis -
16
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
17
Prediction of Surface Flow by Forcing of Climate Forecast System Reanalysis Data
Published 2023Article -
18
Digital economy tax compliance model in Malaysia using machine learning approach
Published 2021“…We conduct descriptive analytics to explore and extract a summary of data for initial understanding. Through a brief description of the descriptive model, the data distribution in a histogram shows that the information extracted can give a clear picture in influencing the results to classify digital economic tax compliance. …”
Get full text
Get full text
Get full text
Article -
19
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…By using the daily observed data, ANN can map the relationship between rainfall-runoff. …”
Get full text
Get full text
Get full text
Thesis -
20
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…In addition, simulated data can overcome the lack of genuine datasets for specific crowd situations. …”
Get full text
Get full text
Get full text
Get full text
Thesis
