Enviar búsqueda
Cargar
Trabajo de jaime quilumbango
•
0 recomendaciones
•
217 vistas
C
ch0lito
Seguir
Denunciar
Compartir
Denunciar
Compartir
1 de 5
Recomendados
Mira app prototype
Mira app prototype
Elena Nemilova
Portfolio slides
Portfolio slides
StephLwriter
61번 최석우 예방논문1 발표
61번 최석우 예방논문1 발표
Benedict Choi
Introducción al diseño de los lenguajes de programación.
Unidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacion
Lilia Velasco
Pca glee sarkissian
Pca glee sarkissian
rsarkissian
Presentazione del progetto LibreUmbria in occasione del Linux Day 2013 ad Orvieto
Linux Day 2013 - LibreUmbria
Linux Day 2013 - LibreUmbria
Stefano Paggetti
38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표
Benedict Choi
Pca glee sarkissian
Pca glee sarkissian
rsarkissian
Recomendados
Mira app prototype
Mira app prototype
Elena Nemilova
Portfolio slides
Portfolio slides
StephLwriter
61번 최석우 예방논문1 발표
61번 최석우 예방논문1 발표
Benedict Choi
Introducción al diseño de los lenguajes de programación.
Unidad 2 Introducción al diseño de los lenguajes de programacion
Unidad 2 Introducción al diseño de los lenguajes de programacion
Lilia Velasco
Pca glee sarkissian
Pca glee sarkissian
rsarkissian
Presentazione del progetto LibreUmbria in occasione del Linux Day 2013 ad Orvieto
Linux Day 2013 - LibreUmbria
Linux Day 2013 - LibreUmbria
Stefano Paggetti
38번 유고은 예방논문1 발표
38번 유고은 예방논문1 발표
Benedict Choi
Pca glee sarkissian
Pca glee sarkissian
rsarkissian
01 keypoint benchmark
01 keypoint benchmark
Elena Nemilova
61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표
Benedict Choi
Uem
Uem
Elena Nemilova
Storyboard
Storyboard
Elena Nemilova
해안서영남팀 최종결과보고서
해안서영남팀 최종결과보고서
Boyoung Im
Trabalho do aba
My dream
My dream
Francisco Sátiro
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed through recursive modulo - 2 substitution using mutated character code generation for online wireless communication of data/information. Both sender and receive r get synchronized based on their final output . The length of the key depends on the number of input and output neurons. Coordinated matching weight vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i s the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of chromosomes. At first mutated character code table based encryption strategy get perform on plain text. . Then the intermediate cipher text is yet again encry pted through recursive positional modulo - 2 substitution technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to form the final cipher text through chaining and cascaded xoring of neuro genetic key with the identical length intermediate cipher text block. Receiver will perform same symmetric operation to get back the plain text using identical key
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
ijcsity
Baldor+ +algebra
Baldor+ +algebra
Agustin Constantino
Case study
Case study
Elena Nemilova
Layout tesi stampa
Layout tesi stampa
Elena Nemilova
This was presented at the Higher Education Council on June 10, 2013
More than a Bridge: Measuring the Impact of transitional programming at CSU
More than a Bridge: Measuring the Impact of transitional programming at CSU
christinevodicka
The need for a reliable and efficient way of storing and mining data about people living with HIV/AIDs with the intent to monitor the health status for effective therapy is on the increase. This paper presents a model of a web-based system for knowledge warehousing and mining of diagnosis and therapy of HIV/AIDs using Fuzzy Logic and data mining approach. A model was developed, using the predictive modeling technique, for predicting HIV/AIDs and monitoring of patient health status. The fuzzy inference rule and a decision support system based on cognitive filtering was employed to determine the possible course of action to be taken. A case study of some data of PLWH was used and the result obtained shows that the developed system is efficient. The system uses XAMP on Windows OS platform. The system was tested and evaluated with satisfactory results
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
ijcsity
54번 정영욱 예방논문1. 발표
54번 정영욱 예방논문1. 발표
Benedict Choi
Circunferencia trigonometrica
Circunferencia trigonometrica
Pedro Natividad H
Raccolta molecole mental model uxl
Raccolta molecole mental model uxl
Elena Nemilova
Simple guide for small businesses - how to start using social media
How to use social media
How to use social media
Nick Leech
Heritage worth spreading
Heritage worth spreading
Boyoung Im
Ux research evolaris
Ux research evolaris
Elena Nemilova
Diseño y construcción de una máquina serigráfica automatizada realizada con microcontrolador MEGA 2560, processing. Por accionamiento electro neumático. Motor paso a paso y sensores de posicionamiento (encoder, sensor infrarrojo).
Diseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizada
Raúl Cordova
OpenStack Essentialls. A brief overview of OpenStack including what it is, where it's come from, what it's competitors are and where it's going.
OpenStack Essentials
OpenStack Essentials
Anish Patel
Más contenido relacionado
Destacado
01 keypoint benchmark
01 keypoint benchmark
Elena Nemilova
61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표
Benedict Choi
Uem
Uem
Elena Nemilova
Storyboard
Storyboard
Elena Nemilova
해안서영남팀 최종결과보고서
해안서영남팀 최종결과보고서
Boyoung Im
Trabalho do aba
My dream
My dream
Francisco Sátiro
In this paper, a neural genetic key based technique for encryption (NGKRMSMC) has been proposed through recursive modulo - 2 substitution using mutated character code generation for online wireless communication of data/information. Both sender and receive r get synchronized based on their final output . The length of the key depends on the number of input and output neurons. Coordinated matching weight vectors assist to generate chromosomes pool. Genetic secret key is obtained using fitness function, which i s the hamming distance between two chromosomes. Crossover and mutation are used to add elitism of chromosomes. At first mutated character code table based encryption strategy get perform on plain text. . Then the intermediate cipher text is yet again encry pted through recursive positional modulo - 2 substitution technique to from next level encrypted text. This 2nd level intermediate cipher text is again encrypted to form the final cipher text through chaining and cascaded xoring of neuro genetic key with the identical length intermediate cipher text block. Receiver will perform same symmetric operation to get back the plain text using identical key
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
ijcsity
Baldor+ +algebra
Baldor+ +algebra
Agustin Constantino
Case study
Case study
Elena Nemilova
Layout tesi stampa
Layout tesi stampa
Elena Nemilova
This was presented at the Higher Education Council on June 10, 2013
More than a Bridge: Measuring the Impact of transitional programming at CSU
More than a Bridge: Measuring the Impact of transitional programming at CSU
christinevodicka
The need for a reliable and efficient way of storing and mining data about people living with HIV/AIDs with the intent to monitor the health status for effective therapy is on the increase. This paper presents a model of a web-based system for knowledge warehousing and mining of diagnosis and therapy of HIV/AIDs using Fuzzy Logic and data mining approach. A model was developed, using the predictive modeling technique, for predicting HIV/AIDs and monitoring of patient health status. The fuzzy inference rule and a decision support system based on cognitive filtering was employed to determine the possible course of action to be taken. A case study of some data of PLWH was used and the result obtained shows that the developed system is efficient. The system uses XAMP on Windows OS platform. The system was tested and evaluated with satisfactory results
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
ijcsity
54번 정영욱 예방논문1. 발표
54번 정영욱 예방논문1. 발표
Benedict Choi
Circunferencia trigonometrica
Circunferencia trigonometrica
Pedro Natividad H
Raccolta molecole mental model uxl
Raccolta molecole mental model uxl
Elena Nemilova
Simple guide for small businesses - how to start using social media
How to use social media
How to use social media
Nick Leech
Heritage worth spreading
Heritage worth spreading
Boyoung Im
Ux research evolaris
Ux research evolaris
Elena Nemilova
Diseño y construcción de una máquina serigráfica automatizada realizada con microcontrolador MEGA 2560, processing. Por accionamiento electro neumático. Motor paso a paso y sensores de posicionamiento (encoder, sensor infrarrojo).
Diseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizada
Raúl Cordova
OpenStack Essentialls. A brief overview of OpenStack including what it is, where it's come from, what it's competitors are and where it's going.
OpenStack Essentials
OpenStack Essentials
Anish Patel
Destacado
(20)
01 keypoint benchmark
01 keypoint benchmark
61번 최석우 예방논문2 발표
61번 최석우 예방논문2 발표
Uem
Uem
Storyboard
Storyboard
해안서영남팀 최종결과보고서
해안서영남팀 최종결과보고서
My dream
My dream
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Baldor+ +algebra
Baldor+ +algebra
Case study
Case study
Layout tesi stampa
Layout tesi stampa
More than a Bridge: Measuring the Impact of transitional programming at CSU
More than a Bridge: Measuring the Impact of transitional programming at CSU
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
ONLINE FUZZY-LOGIC KNOWLEDGE WAREHOUSING AND MINING MODEL FOR THE DIAGNOSIS A...
54번 정영욱 예방논문1. 발표
54번 정영욱 예방논문1. 발표
Circunferencia trigonometrica
Circunferencia trigonometrica
Raccolta molecole mental model uxl
Raccolta molecole mental model uxl
How to use social media
How to use social media
Heritage worth spreading
Heritage worth spreading
Ux research evolaris
Ux research evolaris
Diseño y construcción de una máquina serigráfica automatizada
Diseño y construcción de una máquina serigráfica automatizada
OpenStack Essentials
OpenStack Essentials