Search Results - (( _ application tools algorithm ) OR ( some applications ((mmla algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- application tools »
- some applications »
- tools algorithm »
- mmla algorithm »
- rsa algorithm »
-
1
-
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
4
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
5
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
8
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
10
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
11
-
12
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
13
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The computational results and comparison with other related tools are presented to show the effectiveness of the proposed algorithm and tools.…”
Get full text
Get full text
Get full text
Article -
14
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
15
Artificial Immune System (AIS) Algorithm For Optimizing Shear Zone Temperature In CNC Turning Operation
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
17
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Evidence-based diagnostic algorithm for visceral leishmaniasis in Bangladesh
Published 2021“…Diagnostic precision and other inherent indicators were considered for index scoring (IS) of performance of tools using factor analysis. A diagnostic algorithm was formulated based on the IS and availability of the tools at different health care facilities of Bangladesh. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis
