Search Results - (( based applications rsa algorithm ) OR ( parameter optimization method algorithm ))
Search alternatives:
- parameter optimization »
- based applications »
- applications rsa »
- method algorithm »
- rsa algorithm »
-
1
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
6
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
9
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
10
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
11
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
12
Optimization of turning parameters using genetic algorithm method
Published 2008“…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
Get full text
Get full text
Undergraduates Project Papers -
13
Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis
Published 2018“…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of PID parameters for hydraulic positioning system utilizing variable weight Grey-Taguchi and particle swarm optimization
Published 2014“…Particle swarm optimization algorithm (PSO) is one of the artificial intelligence methods. …”
Get full text
Get full text
Thesis -
15
Optimization of turning parameters using ant colony optimization
Published 2008“…The project objectives are to develop Ant Colony Optimization (ACO) algorithm for CNC turning process and to optimize turning parameters for minimized production cost per unit. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail
Published 2014“…Trial and error often serves as the best method to determine the parameter. Therefore, a good optimization technique is required for identify the best parameter in minimizing the forecast errors. …”
Get full text
Get full text
Research Reports -
17
Fitness-guided particle swarm optimization with adaptive Newton-Raphson for photovoltaic model parameter estimation
Published 2025Subjects:Article -
18
Application Of Genetic Algorithms For Robust Parameter Optimization
Published 2010“…Genetic algorithms (GA) are fairly recent in this respect but afford a novel method of parameter optimization. …”
Get full text
Get full text
Article -
19
Optimization of PID Parameters Utilizing Variable Weight Grey-Taguchi Method and Particle Swarm Optimization
Published 2017“…Particle swarm optimization algorithm (PSO) is one of the artificial intelligence methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study
Published 2023“…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
Get full text
Get full text
Article
