|
|
|
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche...
ver más
|
|
|
|
|
|
|
Donya Hajializadeh
With the ever-increasing number of well-aged bridges carrying traffic loads beyond their intended design capacity, there is an urgency to find reliable and efficient means of monitoring structural safety and integrity. Among different attempts, vibration...
ver más
|
|
|
|
|
|
|
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev and Evgeny Kostuchenko
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user?s face is converted to parameters that later are used in a recognition process. On the o...
ver más
|
|
|
|
|
|
|
Gregory Hill and Xavier Bellekens
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures per...
ver más
|
|
|
|
|
|
|
Adi Widarma
Pág. 1 - 8
Abstrak ? Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan sangat rahasia dan harus dijaga keamanannya. Untuk menjaga keamanan data, ...
ver más
|
|
|
|
|
|
|
Puji Sari Ramadhan,Muhammad Syahril,Rini Kustini,Hendryan Winata,Robin Darwis Gea
Pág. 60 - 70
This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the develo...
ver más
|
|
|
|