Showing 1 - 20 results of 109 for search '(( elements method algorithm ) OR ((( data code algorithm ) OR ( data encryption algorithm ))))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
  6. 6
  7. 7
  8. 8
  9. 9

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
    Get full text
    article
  11. 11
  12. 12

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
  19. 19

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  20. 20