Search Results - (( same drops algorithm ) OR ( same ((rsa algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A RSA-type cryptosystem based on quartic polynomials by Wong, Tze Jin

    Published 2011
    “…Therefore, the aim of this study is to analyze and implement a new cryptosystem which is more secure than RSA, LUC and LUC3 cryptosystem for same bit of keys. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Affine projection algorithm for speech enhancement using controlled projection order by Noor, Ali O. Abid

    Published 2020
    “…The method was tested under various types of noise and showed better convergence performance than the original APA as well as other commonly used algorithms in noise cancellation systems. The MSE of the proposed VPAPA method drops to -65 dB in steady state compared to -20 dB using NLMS and just below -30 dB using standard APA with projection order of 8, while the powerful RLS reaches around -60dB under the same environment. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The first algorithm DCFP outperforms the NCPR algorithm in terms of normalize routing overhead by 11.27%, while maintaining the same packet delivery ratio. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization of electrical wiring design in buildings using particle swarm optimization and genetic algorithm / Tuan Ahmad Fauzi Tuan Abdullah by Tuan Ahmad Fauzi, Tuan Abdullah

    Published 2017
    “…Comparison between the results using PSO and GA shows that both methods yield the same total cost and total voltage drop but GA yields consistent results compared to PSO. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.] by Udin, Md Nizam, Amin, Farah Azliney, Shahril, Rahmah, Mohd Nasir, Naufal, Ahmad Bzayauddin, Nur Shafiqah

    Published 2017
    “…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
    Get full text
    Get full text
    Book Section
  8. 8

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    On (unknowingly) using near-square RSA primes by Ruzai, Wan Nur Aqlili, Abd Ghafar, Amir Hamzah, Salim, Nur Raidah, Kamel Ariffin, Muhammad Rezal

    Published 2022
    “…We formulate attacks using three different algorithms to better understand their feasibility. We also provide an efficient countermeasure that it is recommended is adopted by current cryptographic libraries with RSA implementation.…”
    Get full text
    Get full text
    Article
  10. 10

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Throughput and packet overhead is improved in the NIPT algorithm with an average of 4% and 6% respctively over the PT algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…The performance of ECRP algorithms was compared with other cluster based algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…For dynamic requests, a handler evaluates acceptance based on time constraints, and schedule re-optimization is triggered as necessary, using the same methods as in the static case. Extensive experiments validate the algorithm’s effectiveness, optimize parameters, and demonstrate the dynamic handler's ability to manage real-time requests accurately. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Synaptogenesis based bio-inspired NoC fault tolerant interconnects by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2013
    “…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. This algorithm is fault tolerant as it adapts the mechanism of biological brain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Synaptogenesis based bio-inspired NoC fault tolerant interconnects by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2013
    “…In this paper a synaptogenesis bases bio-inspired algorithm is proposed for NoC. This algorithm is fault tolerant as it adapts the mechanism of biological brain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhanced Handover Algorithm for Quality of Service Maintenance in an Extended Service Set Wi-Fi Network by Derrick Qin Sheng, Wong

    Published 2025
    “…With the increasing number of wireless devices, the frequencies used by the IEEE 802.11 network have become crowded, with many wireless devices available in the same location. A congested wireless network will not only cause wireless devices to have poor network data rates, but also lead to signal drops between the Access Point and the devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…For a smaller key size, ECC is able to provide the same level of security with RSA. This feature made ECC one of the most popular PKC algorithms today. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…This research attempts to develop a new control algorithm to regulate the blood glucose level (BGL) for Type 1 Diabetes. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…The proposed compensator in this work is series active power filter which has ability to compensate power system harmonics at the same time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20