|
|
|
Marko Gulic and Martina ?u?kin
In this paper, a hybrid nature-inspired metaheuristic algorithm based on the Genetic Algorithm and the African Buffalo Optimization is proposed. The hybrid approach adaptively switches between the Genetic Algorithm and the African Buffalo Optimization du...
ver más
|
|
|
|
|
|
|
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is...
ver más
|
|
|
|
|
|
|
Youcef Fouzar, Ahmed Lakhssassi and Ramakrishna Mundugar
The safeguarding of intellectual property and maintaining privacy for video content are closely linked to the effectiveness of security protocols employed in internet streaming platforms. The inadequate implementation of security measures by content prov...
ver más
|
|
|
|
|
|
|
Karol Durczak, Piotr Rybacki and Agnieszka Sujak
Knowledge of the use-to-failure periods of process equipment, including agricultural vehicles, is essential for the determination of their durability and reliability. Obtaining any empirical data on this issue is difficult and sometimes impossible. Exper...
ver más
|
|
|
|
|
|
|
Amy Vennos, Kiernan George and Alan Michaels
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or...
ver más
|
|
|
|
|
|
|
Aleksei F. Deon, Oleg K. Karaduta and Yulian A. Menyaev
White noise generators can use uniform random sequences as a basis. However, such a technology may lead to deficient results if the original sequences have insufficient uniformity or omissions of random variables. This article offers a new approach for c...
ver más
|
|
|
|
|
|
|
Kazuki Nakamura, Koji Hori and Shoichi Hirose
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import...
ver más
|
|
|
|
|
|
|
Oleg K. Karaduta, Aleksei F. Deon and Yulian A. Menyaev
Photomatrix therapeutic systems (PMTS) are widely used for the tasks of preventive, stimulating and rehabilitation medicine. They consist of low-intensity light-emitting diodes (LEDs) having the quasi-monochromatic irradiation properties. Depending on th...
ver más
|
|
|
|
|
|
|
Amin Salih Mohammed,Ihor Romanenko,Saravana Balaji B,Yevhen Kalashnikov,Nina Kuchuk
Pág. pp. 224 - 245
Due to an increase in the number of radio devices with different types of signals and to increase the speed of information transmission, it is necessary to take into account the increase in the probability of erroneous reception of signals as a result of...
ver más
|
|
|
|
|
|
|
Ernestasia, Esther Nababan, Asima Manurung
Pág. 110 - 125
In the queuing system, inter arrival variable and service time variable are probabilistic and its pattern follow a Poisson distribution. Simulations experiment for performance measurement of a queuing system required random data. In practice, random data...
ver más
|
|
|
|