Search Results - (( based evaluation rsa algorithm ) OR ( panel identification _ algorithm ))*

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Model predictive control for MPPT of distributed photovoltaic module by Jowalin, Wellfred

    Published 2017
    “…Unfortunately, a P&O algorithm does not harvesting a true MPP of the PV panel during the operation. …”
    Get full text
    Get full text
    Student Project
  6. 6
  7. 7

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC) by Yunos, Faridah, Mohd Atan, Kamel Ariffin, Kamel Ariffin, Muhammad Rezal, Md. Said, Mohamad Rushdan

    Published 2014
    “…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling by Hamat, Sanusi, Ishak, Mohamad Ridzwan, Kelly, Piaras, Salit, Mohd Sapuan, Yidris, Noorfaizal, Ali, Syamir Alihan Showkat, Hussin, Mohd Sabri, Mohd Dawi, Mohd Syedi Imran

    Published 2025
    “…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system by Mohamed Ameerdin, Muhammad Irshat, Jamaluddin, Muhammad Herman, Shukor, Ahmad Zaki, Mohamad, Syazwani

    Published 2024
    “…YOLO algorithms are utilized for their real-time detection capabilities, allowing for immediate identification and categorization of defects during routine inspections. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Optimizing solar streetlight systems for sustainable urban and community development by Jun, L. W., Zabri, Siti Normi, Mohd Kassim, N. S., Mohamad, Sarah Yasmin

    Published 2025
    “…The research involved determining the optimal tilt angle of the solar panel to maximize power generation under varying environmental conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Fault-tolerant power extraction strategy for photovoltaic energy systems by Boutasseta, Nadir, Ramdani, Messaoud, Mekhilef, Saad

    Published 2018
    “…The FDI method is based on monitoring the PV panel generated power for the presence of abrupt changes; the MPPT reconfiguration is based on a combination between Incremental Conductance (IncCond) Algorithm and an Improved Current-based Particle Swarm Optimization (ICPSO) tracking technique. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques by Che Soh, Azura, Mohamad Radzi, Nur Fadzilah, Mohamad Yusof, Umi Kalsom, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2018
    “…The emphasis on the ability of proposed electronic nose enhance with herbs recognition algorithm in this project was to distinctive odour pattern of the herbs leaves from three families group. …”
    Get full text
    Get full text
    Get full text
    Article