Search Results - (( _ application ((rsa algorithm) OR (means algorithm)) ) OR ( its location based algorithm ))
Search alternatives:
- means algorithm »
- rsa algorithm »
- its location »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
4
Data clustering using the bees algorithm
Published 2007“…The main problem with this clustering method is its tendency to converge to local optima. The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Development Of Automatic Liver Segmentation Method For Three- Dimensional Computed Tomography Dataset
Published 2018“…Probabilistic atlas provides the probability for a voxel to be a liver and act as a guide for segmentation. Both the location based and intensity based probabilistic atlas are built from the 20 datasets obtained from SLIVER07. …”
Get full text
Get full text
Monograph -
7
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
9
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…The paper aims to discover an optimal route for VRP by using Improvement Ant Colony System Algorithm (IACS). Optimal routes are founded based on to decrease the distance and the time for each and every one route which directs to quickest the moving of customers to their locations, also based on developing the CVRP model for optimizing the routing issues. …”
Get full text
Get full text
Get full text
Article -
11
Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control
Published 2019“…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article -
12
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…The efficiency of the proposed algorithm was investigated by dividing the validation data into two groups. …”
Get full text
Get full text
Get full text
Article -
13
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
15
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The first contribution is the AMS scheduling algorithm. The aim is to satisfy QoS requirements for time sensitive applications by exploiting the A-MSDU attributes and adopting the idea of enabling selective retransmission in our scheduling algorithm to obtain aggregation with small size to support time-sensitive applications and enable prioritization according to the QoS requirements of the traffic classes. …”
Get full text
Get full text
Thesis -
18
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
19
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
20
