Search Results - (( parallel optimization based algorithm ) OR ( _ utilization rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak by Kabulanto, Nur Fatimah, Abdul Razak, Farah Aina

    Published 2018
    “…In RSA Cryptosystem there are two completely different keys are generated, one key's utilized in encryption data and other corresponding key's utilized for decryption data. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function by Hammash, Nayif Mohammed

    Published 2012
    “…This thesis presents the parallel Bees Algorithm as a new approach for optimizing the last results for the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    New directions in factoring the prime power RSA modulus N = prq by Shehu, Sadiq, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…We utilized the LLL algorithm on k Prime Power RSA public keys (Ni, ei) with Ni = prꜟqꜟ and we were able to factorize the k Prime Power RSA moduli Ni = prꜟqꜟ simultaneously in polynomial time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and implemtation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayyawi by Jabbar Hayyawi, Mustafa

    Published 2016
    “…Performance indices such as workspace, dexterity and stiffness, of the parallel manipulator are studied. The parallel manipulator is optimized based on the performance indices to obtain on the optimal design parameters for achieved maximum performance of the parallel manipulator. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    New vulnerabilities of RSA modulus type N = p²q by Nek Abd Rahman, Normahirah, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…The proposed attacks utilizing the LLL algorithm enables one to factor the k RSA moduli Ni simultaneously.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…Similarly, when data parallelism is introduced in the algorithm the performance of the algorithm improved further by 12% in latency and 17% in throughput when compared to PDWA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes by Mohammad Sigit Arifianto, Tze, Kenneth Kin Teo, Liau, Chung Fan, Liawas Barukang, Zaturrawiah Ali Omar

    Published 2007
    “…They have to be optimized for parallel execution while some parts still do have sequential execution due to data dependencies, which makes the optimization problem two folds, parallel and serial. …”
    Get full text
    Get full text
    Research Report
  13. 13

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…Performance indices such as workspace, dexterity and stiffness, of the parallel manipulator are studied. The parallel manipulator is optimized based on the performance indices to obtain on the optimal design parameters for achieved maximum performance of the parallel manipulator. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
    Article
  15. 15

    PMT : opposition based learning technique for enhancing metaheuristic algorithms performance by Hammoudeh, S. Alamri

    Published 2020
    “…To evaluate the PMT’s performance and adaptability, the PMT was applied to four contemporary metaheuristic algorithms, Differential Evolution, Particle Swarm Optimization, Simulated Annealing, and Whale Optimization Algorithm, to solve 15 well-known benchmark functions as well as 2 real world problems based on the welded beam design and pressure vessel design. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Parallel distributed genetic algorithm development based on microcontrollers framework by Krishnan P.S., Kiong T.S., Koh J.

    Published 2023
    “…This work is focused on the implementation of evolutionary based computer algorithms, genetic algorithms (GAs), on microcontrollers. …”
    Conference paper
  17. 17

    Concurrent factorization of RSA moduli via weak key equations by Ruzai, Wan Nur Aqlili, Ying, You, Muhammad, Khairun Nisak, Asbullah, Muhammad Asyraf, Ariffin, Muhammad Rezal Kamel

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Application of intelligence based genetic algorithm for job sequencing problem on parallel mixed-model assembly line by Noroziroshan, Alireza, Mohd Ariffin, Mohd Khairol Anuar, Ismail, Napsiah

    Published 2010
    “…This study presented an intelligence based genetic algorithm approach to optimize the considered problem objectives through reducing the problem complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
    Get full text
    Get full text
    Thesis
  20. 20

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
    Conference paper