Search Results - (( _ application ((acs algorithm) OR (path algorithm)) ) OR ( some applications rsa algorithm ))*
Search alternatives:
- some applications »
- applications rsa »
- path algorithm »
- acs algorithm »
- rsa algorithm »
-
1
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
-
4
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal -
7
Strategies DACS3 Increasing its Performances
Published 2009Get full text
Get full text
Citation Index Journal -
8
DACS3:Embedding Individual Ant Behavior in Ant Colony System
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
DACS3: Embedding Malaysian Individual Ant Behavior in Ant Colony System
Published 2009Get full text
Get full text
Citation Index Journal -
10
-
11
-
12
Aplikasi Algoritma Dijkstra dalam Penyelesaian Berbagai Masalah
Published 2021“…The application of Dijkstra's Algorithm in everyday life is very diverse. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
15
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
16
A Kalman Filter Approach to PCB Drill Path Optimization Problem
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
17
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
19
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
20
DC-based PV-powered home energy system
Published 2017“…The disposal of the DC-AC inverter opens the horizon toward high efficiency Solar-Battery-Load system not only in the residential applications but also in general.…”
Get full text
Get full text
Thesis
