Search Results - (( based evaluation rsa algorithm ) OR ( panel identification _ algorithm ))*
Search alternatives:
- panel identification »
- based evaluation »
- evaluation rsa »
- rsa algorithm »
-
1
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
2
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
3
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
5
Model predictive control for MPPT of distributed photovoltaic module
Published 2017“…Unfortunately, a P&O algorithm does not harvesting a true MPP of the PV panel during the operation. …”
Get full text
Get full text
Student Project -
6
-
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
Published 2014“…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
Get full text
Get full text
Get full text
Article -
9
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
10
A review of deep learning-based defect detection and panel localization for photovoltaic panel surveillance system
Published 2024“…YOLO algorithms are utilized for their real-time detection capabilities, allowing for immediate identification and categorization of defects during routine inspections. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Optimizing solar streetlight systems for sustainable urban and community development
Published 2025“…The research involved determining the optimal tilt angle of the solar panel to maximize power generation under varying environmental conditions. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
System identification of a solar maximum power point tracking system for dual axis / Thomas Davion, Noorazlina Mohamid Salih and Mohd Shahrizan Mohd Said
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
-
15
Fault-tolerant power extraction strategy for photovoltaic energy systems
Published 2018“…The FDI method is based on monitoring the PV panel generated power for the presence of abrupt changes; the MPPT reconfiguration is based on a combination between Incremental Conductance (IncCond) Algorithm and an Improved Current-based Particle Swarm Optimization (ICPSO) tracking technique. …”
Get full text
Get full text
Article -
16
Development of electronic nose for classification of aromatic herbs using Artificial Intelligent techniques
Published 2018“…The emphasis on the ability of proposed electronic nose enhance with herbs recognition algorithm in this project was to distinctive odour pattern of the herbs leaves from three families group. …”
Get full text
Get full text
Get full text
Article
