Search Results - (( based application ((rsa algorithm) OR (new algorithm)) ) OR ( based equation model algorithm ))
Search alternatives:
- based application »
- model algorithm »
- based equation »
- equation model »
- rsa algorithm »
- new algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications
Published 2018“…Several numerical techniques compete to fit the curves of empirical data such as wind, solar, and demand power rates. This paper proposes a new modified methodology presented as a parametric technique to determine the system’s modeling equations based on the Bode plot equations and the vector fitting (VF) algorithm by fitting the experimental data points. …”
Get full text
Get full text
Get full text
Article -
5
-
6
New Quasi-Newton Equation And Method Via Higher Order Tensor Models
Published 2010“…The efficiency of the usual QN methods is improved by accelerating the performance of the algorithms without causing more storage demand. The presented equation allows the modification of several algorithms involving QN equations for practical optimization that possess superior convergence prop- erty. …”
Get full text
Get full text
Thesis -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model
Published 2021“…This paper presents a new diagnostic model for various diseases. In the proposed diagnostic model, a water wave optimization (WWO) algorithm was implemented for improving the diagnosis accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Relative motion guidance, navigation and control for autonomous spacecraft rendezvous
Published 2011“…These algorithms are based on using the analytical closed-form solution of the Tschauner-Hempel equations that is completely explicit in time. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
12
Development of group method of data handling based on genetic algorithm to predict incipient motion in rigid rectangular storm water channel
Published 2017“…Using three di erent sources ofexperimental data and GMDH-GA model, a new equation is proposed to predict incipientmotion. …”
Get full text
Get full text
Get full text
Article -
13
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
14
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…A data parallel algorithm (DPA-EHD) is designed and implemented for the EHD equations. …”
Get full text
Get full text
Thesis -
15
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
16
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
17
-
18
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
19
Mathematical modelling of mass transfer in multi-stage rotating disc contactor column
Published 2006“…This derivation initiated the formulation of the modi¯ed quadratic driving force, called Time-dependent Quadratic Driving Force (TQDF). Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later re¯ned to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
Get full text
Get full text
Get full text
Monograph -
20
