Search Results - (( its application ((rsa algorithm) OR (new algorithm)) ) OR ( _ location based algorithm ))
Search alternatives:
- its application »
- rsa algorithm »
- new algorithm »
- _ location »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
4
A coordinated design of PSSs and UPFC-based stabilizer using Genetic Algorithm
Published 2013Get full text
Conference or Workshop Item -
5
-
6
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
Get full text
Get full text
Get full text
Article -
7
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
8
Application of genetic algorithm in optimization of unified power flow controller parameters and its location in the power system network
Published 2013“…This work demonstrates the application of Genetic Algorithm (GA) technique for the simultaneous stabilization of power systems using a Unified Power Flow Controller (UPFC). …”
Get full text
Get full text
Article -
9
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
11
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Data clustering using the bees algorithm
Published 2007“…The authors’ team have developed a new population based search algorithm called the Bees Algorithm that is capable of locating near optimal solutions efficiently. …”
Get full text
Get full text
Conference or Workshop Item -
13
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
14
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Pengesanan nombor plat kenderaan menggunakan alkhwarizmi gugusan dan kelancaran jarak larian(GKJL)
Published 2009“…A new algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) approach was applied to locate the license plate at the right position. …”
Get full text
Get full text
Get full text
Article -
16
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The proposed algorithm is simulated for simultaneous OPF-based conflicting objectives, respectively. …”
Get full text
Get full text
Thesis -
17
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
Get full text
Get full text
Get full text
Thesis -
18
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
19
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…This research explored and developed new heuristics based on GA for solving VRPSD. New algorithms, journal papers and computerized system were also developed. …”
Get full text
Get full text
Monograph
