Buscar
Mostrando ítems 1-10 de 1721
A constructive heuristic algorithm for multi-stage transmission expansion planning under N-1 security constraints
(2015-04-01)
The transmission expansion planning (TEP) problem in modern power systems is a large-scale, mixed-integer, non-linear, and non-convex problem. The problem becomes even more complicated when the security constraints are ...
Genetic Operators Applied to Symmetric Cryptography
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
A branch and price algorithm for a Stackelberg Security Game
(Elsevier, 2017)
Mixed integer optimization formulations are an attractive alternative to solve Stackelberg Game problems thanks to the efficiency of state of the art mixed integer algorithms. In particular, decomposition algorithms, such ...
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCPISCATAWAY, 2012)
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against ...
Secure DNA data compression using algebraic curves
(IEEE, 2015)
A system that achieves compression using artificial DNA packaging with the support of two algebraic curves is presented, whereby the Hermitian channel code algorithm introduces gain and safety. Additionally, performance ...
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
(Universidad Nacional de UcayaliPE, 2021)
The implicit idea of the IoT is to follow client's identity effectively, so the security and protection concerns like theft the information and disturbance of tasks are turning out to be basic issues in the present IoT ...
Uma metodologia para o controle de seguranca dinamica de sistemas de energia eletrica
(1998-05-01)
This work presents an algorithm for the security control of electric power systems using control actions like generation reallocation, determined by sensitivity analysis (linearized model) and optimization by neural networks. ...