Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A new encryption algorithm with signature for communication security
Download
002938.pdf
Date
1988
Author
Ünsal, A. Arda
Metadata
Show full item record
Item Usage Stats
81
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/8450
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
A new hybrid multi-relational data mining technique
Toprak, Seda Dağlar; Toroslu, İ. Hakkı; Department of Computer Engineering (2005)
Multi-relational learning has become popular due to the limitations of propositional problem definition in structured domains and the tendency of storing data in relational databases. As patterns involve multiple relations, the search space of possible hypotheses becomes intractably complex. Many relational knowledge discovery systems have been developed employing various search strategies, search heuristics and pattern language limitations in order to cope with the complexity of hypothesis space. In this w...
A new design of privilege management infrastructure with binding signature semantics
Bıçakçı, Kemal; Baykal, Nazife (2004-01-01)
Just like PKI, used to support public key certificates, Privilege Management Infrastructure (PMI) is built to provide a foundation to employ attribute certificates. Although most of the PKI ideas can be applied to PMI as well, PMI has some unique characteristics for instance it should handle attributes containing confidential information. Motivating by this fact, Dawson et al. recently proposed a new PMI design for those who would like to use the outsourced PKI but keep the PMI management inside the organiz...
A new electromagnetic target classification method with MUSIC algorithm
Secmen, Mustafa; Sayan, Gönül (2006-01-01)
This paper introduces a novel method for aspect invariant electromagnetic target recognition based on the use of multiple signal classification (MUSIC) algorithm to extract late-time resonant target features from the ultra-wideband scattered data. This method is mainly based on the usage of MUSIC spectra obtained from electromagnetic scattered data as the target features. This approach achieves very high accuracy rates even at very low signal-to-noise ratio (SNR) values although it needs scattered data for ...
A new multiobjective simulated annealing algorithm
Tekinalp, Ozan (Springer Science and Business Media LLC, 2007-09-01)
A new multiobjective simulated annealing algorithm for continuous optimization problems is presented. The algorithm has an adaptive cooling schedule and uses a population of fitness functions to accurately generate the Pareto front. Whenever an improvement with a fitness function is encountered, the trial point is accepted, and the temperature parameters associated with the improving fitness functions are cooled. Beside well known linear fitness functions, special elliptic and ellipsoidal fitness functions,...
A New Multi-Agent Decision Making Structure and Application to Model-Based Fault Diagnosis Problem
Leblebicioğlu, Mehmet Kemal; Schmidt, Klaus Verner (2017-01-01)
A new hierarchical multi-agent decision-making structure has been proposed. There are two phases of the structure. The first phase is the construction phase where the decision making structure consisting of switching and classification agents is built on the training data set generated by the system scenarios. In construction phase, switching and classification agents are trained and made ready for decision making. In the decision phase, which is the second phase, the class of the new data sample is decided...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. A. Ünsal, “A new encryption algorithm with signature for communication security,” Middle East Technical University, 1988.