Search Results - (( _ application rsa algorithm ) OR ( its application ((means algorithm) OR (search algorithm)) ))
Search alternatives:
- application rsa »
- means algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
3
-
4
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
5
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Energy band gap modeling of doped bismuth ferrite multifunctional material using gravitational search algorithm optimized support vector regression
Published 2021“…The proposed hybrid gravitational search based support vector regression HGS-SVR model was evaluated by its mean squared error (MSE), correlation coefficient (CC), and root mean square error (RMSE). …”
Get full text
Get full text
Get full text
Article -
7
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
8
Enhanced Automated Framework For Cattle Tracking And Classification
Published 2022Get full text
Get full text
Thesis -
9
Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri
Published 2020“…Based on the capabilities of the metaheuristic algorithms, this research is proposing the enhanced Gravitational Search Algorithm (eGSA) to solve the nano-process parameter optimization problem. …”
Get full text
Get full text
Thesis -
10
A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN
Published 2021“…The improvements of the original PSO algorithm are proposed by updating its exploitation phase by incorporating the GWO algorithm because of its strong exploitation capability and the exploration phase using a cellular automaton due to its ability to explore more area by constructing new neighbours. …”
Get full text
Get full text
Thesis -
11
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…The lvABC algorithm is introduced to overcome the local optima problem by enriching the searching behaviour using Levy mutation. …”
Get full text
Get full text
Get full text
Thesis -
13
Keyword search for doa retrieval using N-gram / Anis Safuraa Ahmad Tajudin
Published 2015“…Thus, this project utilizes N-gram method for the search and retrieval process. Various words may have similar meaning and to increase the accuracy of the retrieved result, this project applies the dice and overlap coefficient algorithm to find the synonyms of the searched word. …”
Get full text
Get full text
Thesis -
14
A survey: Challenges of image segmentation based fuzzy c-means clustering algorithm
Published 2024journal::journal article -
15
-
16
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
17
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
The effect of adaptive parameters on the performance of back propagation
Published 2012“…The Back Propagation algorithm or its variation on Multilayered Feedforward Networks is widely used in many applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter
