Search Results - (( some application ((use algorithm) OR (rsa algorithm)) ) OR ( _ application during algorithm ))
Search alternatives:
- application during »
- some application »
- during algorithm »
- use algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
6
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
7
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
8
Early detection of dengue disease using extreme learning machine
Published 2018“…The proposed ELM prevents several backpropagation issues by reducing the used of many parameters that solves the main drawbacks of Backpropagation algorithm that uses during the training phase of Neural Network. …”
Get full text
Get full text
Article -
9
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Hybrid HCS-fuzzy mppt algorithm for hydrokinetic energy harnessing
Published 2022“…The fixed stepsize Hill Climbing Search (HCS) algorithm is widely used due to its simplicity. However, the operating point oscillates around the maximum power point (MPP) during dynamic steady-state resulting waste some amount of energy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…This research proposed a swarm intelligence training algorithm, Improved African Buffalo Optimization algorithm (IABO) based on the Metaheuristic method called the African Buffalo Optimization algorithm (ABO). …”
Get full text
Get full text
Thesis -
13
-
14
Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems
Published 2024“…Hence, optimization algorithms, consisting of exact and heuristic methods, are crucial for a myriad of real-world applications. …”
Get full text
Get full text
Thesis -
15
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…It is essential to provide new platforms that benefit the user and are more convenient to use. The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
16
-
17
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
19
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
20
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…Since special operational restrictions or requirements may exist in some real applications such as customer‘s working period that some customers must be serviced during a specified time interval and there can be no delays in servicing those customers. …”
Get full text
Get full text
Get full text
Thesis
