Search Results - (( based location modified algorithm ) OR ( _ application ((based algorithm) OR (rsa algorithm)) ))
Search alternatives:
- location modified »
- based location »
- rsa algorithm »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
10
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
11
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
12
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
13
An Improved Wavelet Neural Network For Classification And Function Approximation
Published 2011“…Second, the proposed enhanced fuzzy c-means clustering algorithm—specifically, the modified point symmetry-based fuzzy c-means (MPSDFCM) algorithm—was employed in selecting the locations of the translation vectors of the WNN. …”
Get full text
Get full text
Thesis -
14
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
15
Guidance and control for satellite in-orbit-self-assembly proximity operations
Published 2015“…The guidance algorithm is based on a modified version of the inbound glideslope transfer that was used in the past for rendezvous and proximity operations of the space shuttle with other vehicles. …”
Get full text
Get full text
Get full text
Article -
16
A variable-capacity-based fuzzy random facility location problem with VaR objective
Published 2010Get full text
Book chapter -
17
-
18
Design of wavelet neural networks based on symmetry fuzzy C-means for function approximation
Published 2013“…In this paper, an enhanced fuzzy C-means algorithm, specifically the modified point symmetry–based fuzzy C-means algorithm (MPSDFCM), was proposed, in order to determine the optimal initial locations for the translation vectors. …”
Get full text
Get full text
Get full text
Article -
19
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…Coastal health of ecosystems can be affected by high concentrations of suspended sediment. In this work, a Modified Hopfield Neural Network Algorithm (MHNNA) was used with remote sensing imagery to classify the total suspended solids (TSS) concentrations in the waters of coastal Langkawi Island, Malaysia. …”
Get full text
Get full text
Get full text
Article -
20
Hybridization of Strength Pareto Multiobjective Optimization with Modified Cuckoo Search Algorithm for Rectangular Array
Published 2017“…In addition, the MCS algorithm is hybridized with the particle swarm optimization (PSO) and hill climbing (HC) stochastic techniques along with the standard strength Pareto evolutionary algorithm (SPEA) forming the MCSPSOSPEA and MCSHCSPEA, respectively.All the proposed MCS-based algorithms are examined to perform MO optimization on Zitzler–Deb–Thiele’s (ZDT’s) test functions. …”
Get full text
Get full text
Get full text
Article
