Journal articles on the topic 'Asymmetric Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Asymmetric Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Maxrizal, Maxrizal, and Baiq Desy Aniska Prayanti. "Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys." CAUCHY 5, no. 4 (2019): 181. http://dx.doi.org/10.18860/ca.v5i4.4408.
Full textDM, Kuryazov. "Optimal Asymmetric Data Encryption Algorithm." International Journal of Science and Research (IJSR) 10, no. 1 (2021): 744–48. https://doi.org/10.21275/sr21107160459.
Full textKarunarathne, J. R. M. D. B., Tharindu Wijethilake, and C. Keppitiyagama. "An Evaluation of Multipath TCP with Highly Asymmetric Subflows." International Journal on Advances in ICT for Emerging Regions (ICTer) 17, no. 1 (2024): 56–65. http://dx.doi.org/10.4038/icter.v17i1.7278.
Full textNarasimha Nayak, V., M. Ravi Kumar, K. Anusha, and Ch Kranthi Kiran. "FPGA based asymmetric crypto system design." International Journal of Engineering & Technology 7, no. 1.1 (2017): 612. http://dx.doi.org/10.14419/ijet.v7i1.1.10788.
Full textKulkarni, P., and D. Dutta. "An Investigation of Techniques for Asymmetry Rectification." Journal of Mechanical Design 117, no. 4 (1995): 620–26. http://dx.doi.org/10.1115/1.2826730.
Full textZafarani, Mohammad M., Amir M. Halabian, and Saeed Behbahani. "Optimal coupled and uncoupled fuzzy logic control for magneto-rheological damper-equipped plan-asymmetric structural systems considering structural nonlinearities." Journal of Vibration and Control 24, no. 7 (2016): 1364–90. http://dx.doi.org/10.1177/1077546316660030.
Full textLiu, Fei, Changqin Gao, and Lisha Liu. "SK-PSO: A Particle Swarm Optimization Framework with SOM and K-Means for Inverse Kinematics of Manipulators." Symmetry 16, no. 12 (2024): 1667. https://doi.org/10.3390/sym16121667.
Full textMA Abualkas, Yaser, and Arshed Raad Raheem. "Asymmetric New Cryptography Algorithm Based on ASCII Code." International Journal of Science and Research (IJSR) 10, no. 6 (2021): 1–4. https://doi.org/10.21275/sr21528214956.
Full textNIELSEN, THOMAS D., and FINN V. JENSEN. "REPRESENTING AND SOLVING ASYMMETRIC DECISION PROBLEMS." International Journal of Information Technology & Decision Making 02, no. 02 (2003): 217–63. http://dx.doi.org/10.1142/s0219622003000604.
Full textHao, Jiakai, Ming Jin, Yuting Li, and Yuxin Yang. "Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification." PeerJ Computer Science 11 (April 4, 2025): e2750. https://doi.org/10.7717/peerj-cs.2750.
Full textKozhevnikov, A. V., D. L. Shalaevskii, I. A. Kozhevnikova, A. S. Smirnov, and K. P. Korepina. "Algorithm for designing asymmetrical rolling mode." Ferrous Metallurgy. Bulletin of Scientific , Technical and Economic Information 80, no. 6 (2024): 72–81. http://dx.doi.org/10.32339/0135-5910-2024-6-72-81.
Full textDuan, Banxiang. "The relaxed asymmetric HSS-like iteration algorithms for a class of weakly nonlinear complementarity problems." ITM Web of Conferences 47 (2022): 02004. http://dx.doi.org/10.1051/itmconf/20224702004.
Full textPichai, Supailin, Khamron Sunat, and Sirapat Chiewchanwattana. "An Asymmetric Chaotic Competitive Swarm Optimization Algorithm for Feature Selection in High-Dimensional Data." Symmetry 12, no. 11 (2020): 1782. http://dx.doi.org/10.3390/sym12111782.
Full textMitra, Pramita, and Christian Poellabauer. "Asymmetric Geographic Forwarding." International Journal of Embedded and Real-Time Communication Systems 2, no. 4 (2011): 46–70. http://dx.doi.org/10.4018/jertcs.2011100104.
Full textKong, Rui, Qiong Wang, Gu Yu Hu, and Zhi Song Pan. "Fuzzy Asymmetric Support Vector Machines." Advanced Materials Research 433-440 (January 2012): 7479–86. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.7479.
Full textWei, Yingxin, Wei Zhou, Zhiqiang Xie, Ming Sun, Zhenjiang Tan, and Wangcheng Cao. "Integrated Scheduling Algorithm Based on the Improved Floyd Algorithm." Symmetry 17, no. 5 (2025): 682. https://doi.org/10.3390/sym17050682.
Full textM.A. Abualkas, Sabreen, and Yaser M. A. Abualkas. "IoT Security: Symmetric and Asymmetric Cryptography using RSA algorithm." International Journal of Science and Research (IJSR) 12, no. 9 (2023): 919–23. http://dx.doi.org/10.21275/sr23906202504.
Full textJeong, Yeon-Keun, and Kwang-Ryul Baek. "Asymmetric Gait Analysis Using a DTW Algorithm with Combined Gyroscope and Pressure Sensor." Sensors 21, no. 11 (2021): 3750. http://dx.doi.org/10.3390/s21113750.
Full textStupak, Howard D., Alexander L. Ramirez, and Corey S. Maas. "Current Management of the Asymmetric Nose." American Journal of Cosmetic Surgery 22, no. 1 (2005): 45–55. http://dx.doi.org/10.1177/074880680502200107.
Full textJun-On, Nipa, and Watcharaporn Cholamjiak. "Enhanced Double Inertial Forward–Backward Splitting Algorithm for Variational Inclusion Problems: Applications in Mathematical Integrated Skill Prediction." Symmetry 16, no. 8 (2024): 1091. http://dx.doi.org/10.3390/sym16081091.
Full textXu, Qiuyan, and Zhiyong Liu. "Alternating Asymmetric Iterative Algorithm Based on Domain Decomposition for 3D Poisson Problem." Mathematics 8, no. 2 (2020): 281. http://dx.doi.org/10.3390/math8020281.
Full textVerma, Rohit, and Jyoti Dhiman. "Implementation of Improved Cryptography Algorithm." International Journal of Information Technology and Computer Science 14, no. 2 (2022): 45–53. http://dx.doi.org/10.5815/ijitcs.2022.02.04.
Full textAhmed, Zakir Hussain. "A Data-Guided Lexisearch Algorithm for the Asymmetric Traveling Salesman Problem." Mathematical Problems in Engineering 2011 (2011): 1–18. http://dx.doi.org/10.1155/2011/750968.
Full textHolló-Szabó, Ákos, and János Botzheim. "Bacterial Memetic Algorithm for Asymmetric Capacitated Vehicle-Routing Problem." Electronics 11, no. 22 (2022): 3758. http://dx.doi.org/10.3390/electronics11223758.
Full textGorbenko, I. D., Ye G. Kachko, M. V. Yesina, and V. A. Ponomar. "Comparative characteristics of Crystals-Kyber and Skelya key encapsulation algorithms (DSTU 8961-2019)." Radiotekhnika, no. 210 (September 28, 2022): 7–21. http://dx.doi.org/10.30837/rt.2022.3.210.01.
Full textZhao, Feng, Yun Jie Zhang, and Min Cai. "An ICA Algorithm Based on Symmetric and Asymmetric Generalized Gaussian Model." Advanced Materials Research 204-210 (February 2011): 470–75. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.470.
Full textZhang, Mengwan, Fengfeng Gao, Jialin Gao, Weiguo Chen, and Chong Aik Lee. "The Cross-Correlation Relationship Between the Real Estate Industry and High-Quality Economic Development." Journal of Systems Science and Information 9, no. 6 (2021): 704–20. http://dx.doi.org/10.21078/jssi-2021-704-17.
Full textRogozhina, Yu S., S. I. Blokhina, and E. S. Bimbas. "Methodological algorithm for eliminating congenital asymmetric cleft of the upper lip and palate." Pediatric dentistry and dental profilaxis 20, no. 2 (2020): 116–22. http://dx.doi.org/10.33925/1683-3031-2020-20-2-116-122.
Full textKhan, Sahib, Muhammad Abeer Irfan, Khalil Khan, et al. "ACO Based Variable Least Significant Bits Data Hiding in Edges Using IDIBS Algorithm." Symmetry 12, no. 5 (2020): 781. http://dx.doi.org/10.3390/sym12050781.
Full textWang, Xingyuan, and Xiaomeng Qin. "Detecting communities by asymmetric intimacy in directed-weighted network." International Journal of Modern Physics C 28, no. 01 (2017): 1750006. http://dx.doi.org/10.1142/s0129183117500061.
Full textMamunov, Maksim V., and Aleksandr V. Patrushev. "Diagnostic efficiency of the main dermatoscopic symptoms and algorithms for detecting skin melanoma." Russian Military Medical Academy Reports 40, no. 1 (2021): 45–52. http://dx.doi.org/10.17816/rmmar64477.
Full textPremsai, Ranga. "IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT FOR IMPROVING CYBER SECURITY." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01283.
Full textWang, Pei, Xu Sheng Yang, Zhuo Yuan Wang, Lin Gong Li, Ji Chang He, and Qing Jie Wang. "Solving Large-Scale Asymmetric Sparse Linear Equations Based on SuperLU Algorithm." Advanced Materials Research 230-232 (May 2011): 1355–61. http://dx.doi.org/10.4028/www.scientific.net/amr.230-232.1355.
Full textZhao, Hong Gang, Hao Shan Shi, and Yong Hui Zhao. "Range-Free Localization Algorithm in Wireless Sensor Networks with Asymmetric Links." Applied Mechanics and Materials 446-447 (November 2013): 1591–95. http://dx.doi.org/10.4028/www.scientific.net/amm.446-447.1591.
Full textAdy Putra, Wahyu, Suyanto Suyanto, and Muhammad Zarlis. "Performance Analysis Of The Combination Of Advanced Encryption Standard Cryptography Algorithms With Luc For Text Security." SinkrOn 8, no. 2 (2023): 890–97. http://dx.doi.org/10.33395/sinkron.v8i2.12202.
Full textMuzamil, Hussain Solangi, Ahmed Mahar Mukhtiar, Sattar Larik Abdul, and Raza Mahessar Mohsin. "Design a Perturb & Observe MPPT Algorithm for PV System Based Asymmetric Cascaded HalfBridge Multilevel Inverter." Indian Journal of Science and Technology 13, no. 4 (2020): 439–52. https://doi.org/10.17485/ijst/2020/v13i04/149530.
Full textBaraa, Tareq Hammad, Maki Sagheer Ali, Taha Ahmed Ismail, and Jamil Norziana. "A comparative review on symmetric and asymmetric DNA-based cryptography." Bulletin of Electrical Engineering and Informatics 9, no. 6 (2020): 2484–91. https://doi.org/10.11591/eei.v9i6.2470.
Full textRohe, Karl, Tai Qin, and Bin Yu. "Co-clustering directed graphs to discover asymmetries and directional communities." Proceedings of the National Academy of Sciences 113, no. 45 (2016): 12679–84. http://dx.doi.org/10.1073/pnas.1525793113.
Full textVujnić, Aleksa, Žarko Stanisavljević, and Maja Vukasović. "Visual representation of post-quantum cryptographic algorithm Kyber." Tehnika 80, no. 1 (2025): 79–86. https://doi.org/10.5937/tehnika2501079v.
Full textGharehchopogh, Farhad Soleimanian, and Aysan Alavi Khargoush. "A Chaotic-Based Interactive Autodidactic School Algorithm for Data Clustering Problems and Its Application on COVID-19 Disease Detection." Symmetry 15, no. 4 (2023): 894. http://dx.doi.org/10.3390/sym15040894.
Full textAstuti, Nur Rochmah Dyah Puji, Dimas Panji Setiawan, and Dhias Cahya Hakika. "COMPARATIVE STUDY OF ELGAMAL AND LUC ALGORITHM IN CRYPTOGRAPHIC KEY GENERATION." ASEAN Engineering Journal 13, no. 4 (2023): 61–68. http://dx.doi.org/10.11113/aej.v13.19184.
Full textPan, Rui, Wei Gao, Yunbo Zuo, Guoxin Wu, and Yuda Chen. "Investigation into defect image segmentation algorithms for galvanised steel sheets under texture backgrounds." Insight - Non-Destructive Testing and Condition Monitoring 65, no. 9 (2023): 492–500. http://dx.doi.org/10.1784/insi.2023.65.9.492.
Full textThomas, Ambili, and V. Lakshmi Narasimhan. "Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment." International Journal of Natural Computing Research 10, no. 2 (2021): 21–41. http://dx.doi.org/10.4018/ijncr.2021040102.
Full textLiana, Liana, Muhammad Zarlis, and Tulus Tulus. "Hybrid Cryptosystem Analysis RSA Algorithm And Triple DES Algorithm." Sinkron 8, no. 3 (2023): 1461–73. http://dx.doi.org/10.33395/sinkron.v8i3.12467.
Full textObaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering Research and Science 5, no. 4 (2020): 395–98. http://dx.doi.org/10.24018/ejers.2020.5.4.1843.
Full textObaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering and Technology Research 5, no. 4 (2020): 395–98. http://dx.doi.org/10.24018/ejeng.2020.5.4.1843.
Full textSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Full textKorolyov, V., M. Ogurtsov, and A. Khodzinsky. "Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security." Cybernetics and Computer Technologies, no. 3 (October 27, 2020): 74–84. http://dx.doi.org/10.34229/2707-451x.20.3.7.
Full textBaxter, Michael. "Forum: A Better Rim Weighting Algorithm." International Journal of Market Research 58, no. 4 (2016): 621–34. http://dx.doi.org/10.2501/ijmr-2016-036.
Full textBalea, Ioana D., Radu Hulea, and Georgios E. Stavroulakis. "Implementation of Eurocode Load Cases in Optimization Problems of Steel Frames, Based on Genetic Algorithms." Applied Mechanics and Materials 310 (February 2013): 609–13. http://dx.doi.org/10.4028/www.scientific.net/amm.310.609.
Full text