Search Results - (( _ application ((among algorithm) OR (path algorithm)) ) OR ( based application rsa algorithm ))*
Search alternatives:
- based application »
- among algorithm »
- application rsa »
- path algorithm »
- rsa algorithm »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. …”
Get full text
Get full text
Thesis -
2
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
AUTOMATIC ROUTE FINDER FOR NEW VISITORS
Published 2006“…This project proposes a new visitor route model that is based on shortest path algorithms for road networks. Shortest path problems are among the best studied network flow optimization problems, with interesting applications in a range of fields. …”
Get full text
Get full text
Final Year Project -
5
Simulation performance comparison of A*, GLS, RRT and PRM path planning algorithms
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The Implementation of Genetic Algorithm in Path Optimization
Published 2005Get full text
Get full text
Final Year Project -
7
-
8
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…This project has the capability to reduce the execution time of application problem using parallel algorithms to increase efficiency of cluster computing. …”
Get full text
Get full text
Thesis -
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
10
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…EECPP consist of two algorithms which is Stop Point Prediction Algorithm using K-Means, which finding the stop point for the AG after grouping the IDs into clusters, and Path Planning Algorithm using Particle Swarm Optimization which connect all of the stop point in shortest route. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
18
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
19
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…The main idea in this algorithm is the indirect communication between the ants which is established by the means of pheromones in finding the shortest path between their nest and food [14]. …”
Get full text
Get full text
Monograph -
20
Development of task distribution algorithm for multi-robot coordination system
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis
