Search Results - (( same drop algorithm ) OR ( same rsa algorithm ))
Search alternatives:
- drop algorithm »
- rsa algorithm »
- same drop »
- same rsa »
-
1
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
2
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Therefore, the aim of this study is to analyze and implement a new cryptosystem which is more secure than RSA, LUC and LUC3 cryptosystem for same bit of keys. …”
Get full text
Get full text
Thesis -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
4
On (unknowingly) using near-square RSA primes
Published 2022“…We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.…”
Get full text
Get full text
Article -
5
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
7
Optimization of electrical wiring design in buildings using particle swarm optimization and genetic algorithm / Tuan Ahmad Fauzi Tuan Abdullah
Published 2017“…Comparison between the results using PSO and GA shows that both methods yield the same total cost and total voltage drop but GA yields consistent results compared to PSO. …”
Get full text
Get full text
Thesis -
8
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The first algorithm DCFP outperforms the NCPR algorithm in terms of normalize routing overhead by 11.27%, while maintaining the same packet delivery ratio. …”
Get full text
Get full text
Get full text
Thesis -
9
Affine projection algorithm for speech enhancement using controlled projection order
Published 2020“…The method was tested under various types of noise and showed better convergence performance than the original APA as well as other commonly used algorithms in noise cancellation systems. The MSE of the proposed VPAPA method drops to -65 dB in steady state compared to -20 dB using NLMS and just below -30 dB using standard APA with projection order of 8, while the powerful RLS reaches around -60dB under the same environment. …”
Get full text
Get full text
Get full text
Article -
10
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…For a smaller key size, ECC is able to provide the same level of security with RSA. This feature made ECC one of the most popular PKC algorithms today. …”
Get full text
Get full text
Thesis -
11
Vehicle pick-up and drop-off schedule optimization in a university setting
Published 2024“…For dynamic requests, a handler evaluates acceptance based on time constraints, and schedule re-optimization is triggered as necessary, using the same methods as in the static case. Extensive experiments validate the algorithm’s effectiveness, optimize parameters, and demonstrate the dynamic handler's ability to manage real-time requests accurately. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Throughput and packet overhead is improved in the NIPT algorithm with an average of 4% and 6% respctively over the PT algorithm. …”
Get full text
Get full text
Thesis -
13
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
Get full text
Get full text
Thesis -
14
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. This algorithm is fault tolerant as it adapts the mechanism of biological brain. …”
Get full text
Get full text
Conference or Workshop Item -
15
Synaptogenesis based bio-inspired NoC fault tolerant interconnects
Published 2013“…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. This algorithm is fault tolerant as it adapts the mechanism of biological brain. …”
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network
Published 2025“…With the increasing number of wireless devices, the frequencies used by the IEEE 802.11 network have become crowded, with many wireless devices available in the same location. A congested wireless network will not only cause wireless devices to have poor network data rates, but also lead to signal drops between the Access Point and the devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Token based path allocation approach for mobile robots in sorting centre for achieving high throughput
Published 2024“…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Adaptive unified neural network for dynamic power quality compensation
Published 2013“…Voltage sag is a temporary voltage drop at the fundamental component of utility voltage line. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimal Charging Strategy for Plug-in Hybrid Electric Vehicle Using Evolutionary Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis
