52   Artículos

 
en línea
Marko Gulic and Martina ?u?kin    
In this paper, a hybrid nature-inspired metaheuristic algorithm based on the Genetic Algorithm and the African Buffalo Optimization is proposed. The hybrid approach adaptively switches between the Genetic Algorithm and the African Buffalo Optimization du... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco    
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar    
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Karol Durczak, Piotr Rybacki and Agnieszka Sujak    
Knowledge of the use-to-failure periods of process equipment, including agricultural vehicles, is essential for the determination of their durability and reliability. Obtaining any empirical data on this issue is difficult and sometimes impossible. Exper... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Amy Vennos, Kiernan George and Alan Michaels    
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Aleksei F. Deon, Oleg K. Karaduta and Yulian A. Menyaev    
White noise generators can use uniform random sequences as a basis. However, such a technology may lead to deficient results if the original sequences have insufficient uniformity or omissions of random variables. This article offers a new approach for c... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Oleg K. Karaduta, Aleksei F. Deon and Yulian A. Menyaev    
Photomatrix therapeutic systems (PMTS) are widely used for the tasks of preventive, stimulating and rehabilitation medicine. They consist of low-intensity light-emitting diodes (LEDs) having the quasi-monochromatic irradiation properties. Depending on th... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Amin Salih Mohammed,Ihor Romanenko,Saravana Balaji B,Yevhen Kalashnikov,Nina Kuchuk     Pág. pp. 224 - 245
Due to an increase in the number of radio devices with different types of signals and to increase the speed of information transmission, it is necessary to take into account the increase in the probability of erroneous reception of signals as a result of... ver más

 
en línea
Ernestasia, Esther Nababan, Asima Manurung     Pág. 110 - 125
In the queuing system, inter arrival variable and service time variable are probabilistic and its pattern follow a Poisson distribution. Simulations experiment for performance measurement of a queuing system required random data. In practice, random data... ver más

« Anterior     Página: 1 de 3     Siguiente »