Search Results - (( _ application need algorithm ) OR ( its application ((rsa algorithm) OR (new algorithm)) ))*

Refine Results
  1. 1

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A new vertical edge detection algorithm and its application by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ismail, Alyani, Ramli, Abdul Rahman

    Published 2008
    “…The need to distinguish the desired details is a very important pre-process in order to give good results in short time processing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid by Ku-Mahamud, Ku Ruhana, Ramli, Razamin, Yusof, Yuhanis, Mohamed Din, Aniza, Mahmuddin, Massudi

    Published 2012
    “…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
    Get full text
    Get full text
    Monograph
  16. 16

    A Review on the Recent Application of Jaya Optimization Algorithm by Alsajri, Mohammad, Mohd Arfian, Ismail, Abdul-Baqi, Saba

    Published 2019
    “…The important difference between Jaya and other optimization algorithms is that Jaya does not require the tuning of its parameters (a process needed in the other algorithms to escape unwanted convergence). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  19. 19

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Each mobile IP agent needs a different application and independently configured. …”
    Get full text
    Get full text
    Thesis
  20. 20