مرور Volume 2, Issue 3 بر اساس عنوان
در حال نمایش موارد 1 - 5 از 5
-
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition
(University of Isfahan & Iranian Society of Cryptology, 2015-07-01)Fuzzy Inference systems have been successfully applied for different pattern recognition problems. However, in some real-world applications such as facial expression recognition, the uncertainties related to the feature ...
-
Improved Secure and Privacy Preserving Keyword Searching Cryptography
(University of Isfahan & Iranian Society of Cryptology, 2015-07-01)Using storage systems outside a company may endanger data security. This leads users to mostly encrypt their information for risk mitigation. Although encryption improves confidentiality, it causes inefficiency such as the ...
-
New Functions for Mass Calculation in Gravitational Search Algorithm
(University of Isfahan & Iranian Society of Cryptology, 2015-07-01)Nowadays, optimization problems are large-scale and complicated, so heuristic optimization algorithms have become common for solving them. Gravitational Search Algorithm (GSA) is one of the heuristic algorithms for solving ...
-
Some Primitives Based on Jumping LFSRs with Determined Period
(University of Isfahan & Iranian Society of Cryptology, 2015-07-01)Linear feedback shift registers (LFSRs) are used in manystream ciphers because of their maximal period and good statistical prop-erties. Due to the linearity of the LFSR, its output cannot be directlyused as the keystream. ...
-
Toward automatic Transformation of Service Choreography into UML State Machine
(University of Isfahan & Iranian Society of Cryptology, 2015-07-01)An adaptive process consists of dynamic elements, and management rules which govern their run-time behaviors. The WS-CDL describes collaborative business processes between service consumers and providers. Adapting the ...



