New statistical Binary Random Test
Binary streams can be tested using standard tests. the efficiency of some tests is not remarkable big, because they do not examine some stream features, which are important to be verified (for example, mono-bit test satisfied every stream that consists of approximate one half zeros(i.e, ones), no ma...
| Main Authors: | Taha, Imad, Hasan, Luay |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Al Rafidain University College
2006
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/7240/ http://irep.iium.edu.my/7240/1/imad-luay.pdf |
Similar Items
On randomness of compressed data using non-parametric
randomness tests
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
by: Al-Khayyat, Kamal A., et al.
Published: (2018)
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
Statistical approach for a complex emotion recognition based on EEG features
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2016)
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2016)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Different local binary operators for texture classification: a comparative study
by: Shamaileh, Abeer, et al.
Published: (2019)
by: Shamaileh, Abeer, et al.
Published: (2019)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Colour texture image classification using colour completed local binary pattern (CCLBP)
by: Al Aidaros, Hussein Ali Hasan
Published: (2019)
by: Al Aidaros, Hussein Ali Hasan
Published: (2019)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Binary context-free grammars
by: Turaev, Sherzod, et al.
Published: (2020)
by: Turaev, Sherzod, et al.
Published: (2020)
Multi-Scale Colour Completed Local Binary Patterns for Scene and Event Sport Image Categorisation
by: Rassem, Taha H., et al.
Published: (2017)
by: Rassem, Taha H., et al.
Published: (2017)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A new binary particle swarm optimizer to select a smaller subset of genes for leukaemia cancer classification
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
by: Mohamad, Mohd. Saberi, et al.
Published: (2008)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective
by: Alawadhi, Nayef, et al.
Published: (2019)
by: Alawadhi, Nayef, et al.
Published: (2019)
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A Binary Replication Strategy for Large-scale Mobile Environments
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Blogging: a new platform for spreading rumors!
by: Zangana, Hewa Majeed, et al.
Published: (2015)
by: Zangana, Hewa Majeed, et al.
Published: (2015)
An Analysis of Basketball Scores Statistics
by: Lee, Tim Soon
Published: (2011)
by: Lee, Tim Soon
Published: (2011)
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
by: Taha, Imad, et al.
Published: (2006)
by: Taha, Imad, et al.
Published: (2006)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
Protecting an Internet Web File using Java
by: Taha, Imad, et al.
Published: (2004)
by: Taha, Imad, et al.
Published: (2004)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Quality evaluation of “safeer” portal for Saudi students studying abroad
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
An anatomy of IGP and BGP routing protocols
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
SVG and Arabic font challenges and improvements
by: Taha, Imad, et al.
Published: (2013)
by: Taha, Imad, et al.
Published: (2013)
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Feature Selection using Binary Simulated Kalman Filter for Peak Classification of EEG Signals
by: Badaruddin, Muhammad, et al.
Published: (2018)
by: Badaruddin, Muhammad, et al.
Published: (2018)
Similar Items
-
On randomness of compressed data using non-parametric
randomness tests
by: Al-Khayyat, Kamal A., et al.
Published: (2018) -
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016) -
Statistical approach for a complex emotion recognition based on EEG features
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2016) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Different local binary operators for texture classification: a comparative study
by: Shamaileh, Abeer, et al.
Published: (2019)