Search Results - (( data application rsa algorithm ) OR ( parameter estimation method algorithm ))*

Refine Results
  1. 1

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…This RSA co-processor core is able to encrypt and decrypt data with variable key lengths up to 4096 bits. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…A computationally simple two-step iterative algorithm, called estimationapproximation algorithm, is introduced for estimating the parameters of the model on the basis of the rank estimators. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  13. 13

    An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems by Remli, Muhammad Akmal, Mohamad, Mohd Saberi, Deris, Safaai, Sinnott, Richard, Napis, Suhaimi

    Published 2019
    “…Methods: This paper proposes an improved scatter search algorithm to address the challenging parameter estimation problem. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse) by Jia, Xing Yeoh, Chuii, Khim Chong, Mohd Saberi, Mohamad, Yee, Wen Choon, Lian, En Chai, Safaai, Deris, Zuwairie, Ibrahim

    Published 2015
    “…The hybrid of Differential Evolution algorithm with Kalman Filtering and Bacterial Foraging algorithm is a novel global optimisation method implemented to obtain the best kinetic parameter value. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Results suggest that the PSO algorithm is viable alternative to other established algorithms for LLS parameter estimation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Parameter estimation of tapioca starch hydrolysis process: application of least squares and genetic algorithm by Rashid, Roslina, Jamaluddin, Hishamuddin, Saidina Amin, Nor Aishah

    Published 2005
    “…The performance of genetic algorithm (GA) in nonlinear kinetic parameter estimation of topiaca starch hydrolysis was studied and compared with Gauss-Newton method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…The objective of this research is to estimate the Double Exponential Smoothing by using Genetic Algorithm Mechanism. …”
    Get full text
    Get full text
    Research Reports