Search Results - (( based application ((rsa algorithm) OR (_ algorithm)) ) OR ( based equation model algorithm ))
Search alternatives:
- based application »
- model algorithm »
- based equation »
- equation model »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
-
8
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…However, most model selection algorithms such as Autometrics only concentrate on single equation modelling which has limited application. …”
Get full text
Get full text
Get full text
Thesis -
9
Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications
Published 2018“…This paper proposes a new modified methodology presented as a parametric technique to determine the system’s modeling equations based on the Bode plot equations and the vector fitting (VF) algorithm by fitting the experimental data points. …”
Get full text
Get full text
Get full text
Article -
10
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
11
Hybrid sine-spiral dynamic algorithm for dynamic modelling of a flexible manipulator
Published 2019“…This paper presents a newly developed algorithm formulated based on a synergy between a mathematical sine equation and a spiral equation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017“…Structural Equation Modeling (SEM) is a statistical-based multivariate modeling methods, Application of SEM is similar but more powerful than regression analysis; and number of scientists using SEM in their research is rupidly inereasing. …”
Get full text
Get full text
Get full text
Book Chapter -
13
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
14
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
15
Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models
Published 2023“…Based on the identical dataset, the GA-BP and PSO-BP algorithms are also compared to the PCA-BAS-ENN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations
Published 2011“…These algorithms are based on using the analytical closed-form solution of the Tschauner-Hempel equations that is completely explicit in time. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Guidance, navigation and control for satellite proximity operations using Tschauner-Hempel equations
Published 2014“…These algorithms are based on using the analytical closed-form solution of the Tschauner-Hempel equations that is completely explicit in time. …”
Get full text
Get full text
Get full text
Article -
18
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model
Published 2021“…This paper presents a new diagnostic model for various diseases. In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article
