Search Results - (( _ application rsa algorithm ) OR ( its application ((means algorithm) OR (search algorithm)) ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Energy band gap modeling of doped bismuth ferrite multifunctional material using gravitational search algorithm optimized support vector regression by Owolabi, Taoreed O., Abd Rahman, Mohd Amiruddin

    Published 2021
    “…The proposed hybrid gravitational search based support vector regression HGS-SVR model was evaluated by its mean squared error (MSE), correlation coefficient (CC), and root mean square error (RMSE). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri by Mohd Sabri, Norlina

    Published 2020
    “…Based on the capabilities of the metaheuristic algorithms, this research is proposing the enhanced Gravitational Search Algorithm (eGSA) to solve the nano-process parameter optimization problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction by Zuriani, Mustaffa

    Published 2014
    “…The lvABC algorithm is introduced to overcome the local optima problem by enriching the searching behaviour using Levy mutation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Keyword search for doa retrieval using N-gram / Anis Safuraa Ahmad Tajudin by Ahmad Tajudin, Anis Safura

    Published 2015
    “…Thus, this project utilizes N-gram method for the search and retrieval process. Various words may have similar meaning and to increase the accuracy of the retrieved result, this project applies the dice and overlap coefficient algorithm to find the synonyms of the searched word. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    The effect of adaptive parameters on the performance of back propagation by Abdul Hamid, Norhamreeza

    Published 2012
    “…The Back Propagation algorithm or its variation on Multilayered Feedforward Networks is widely used in many applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20