12   Artículos

 
en línea
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas    
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Donya Hajializadeh    
With the ever-increasing number of well-aged bridges carrying traffic loads beyond their intended design capacity, there is an urgency to find reliable and efficient means of monitoring structural safety and integrity. Among different attempts, vibration... ver más
Revista: Infrastructures    Formato: Electrónico

 
en línea
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev and Evgeny Kostuchenko    
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user?s face is converted to parameters that later are used in a recognition process. On the o... ver más
Revista: Information    Formato: Electrónico

 
en línea
Gregory Hill and Xavier Bellekens    
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures per... ver más
Revista: Information    Formato: Electrónico

 
en línea
Adi Widarma     Pág. 1 - 8
Abstrak ? Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan sangat rahasia dan harus dijaga keamanannya. Untuk menjaga keamanan data, ... ver más

 
en línea
Puji Sari Ramadhan,Muhammad Syahril,Rini Kustini,Hendryan Winata,Robin Darwis Gea     Pág. 60 - 70
This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the develo... ver más

« Anterior     Página: 1 de 1     Siguiente »