Search Results - (( based application rsa algorithm ) OR ( _ application ((out algorithm) OR (search algorithm)) ))

Refine Results
  1. 1
  2. 2

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic by Sa'ad, Suleiman, Abdullah, Muhammed, Abdullah, Azizol, Ayob, Fahrul Hakim

    Published 2022
    “…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    An adaptive gravitational search algorithm for global optimization by Koay Y.-Y., Tan J.-D., Lim C.-W., Koh S.-P., Tiong S.-K., Ali K.

    Published 2023
    “…Gravitational Search Algorithm (GSA) is one of the relatively new population-based optimization algorithms. …”
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…This research proposes the enhanced metaheuristic algorithms that exploit the power of Tabu Search, Genetic Algorithm, and Simulated Annealing for solving VRPSD. …”
    Get full text
    Get full text
    Monograph
  16. 16

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18
  19. 19
  20. 20