Search Results - (( some applications rsa algorithm ) OR ( based application system algorithm ))
Search alternatives:
- some applications »
- based application »
- applications rsa »
- system algorithm »
- rsa algorithm »
-
1
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
5
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
7
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
8
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
9
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
10
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
11
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
12
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
Get full text
Get full text
Thesis -
13
Algorithm development for optimization of a refrigeration system
Published 2010“…The thesis describes the step by step the method to find an algorithm by using experimental data. Vapor compression refrigeration system was studied as it is the most widely used refrigeration system especially in small scale of refrigeration application such as in domestic application. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…This paper presents two variants of the Opposition-based Spiral Dynamic Algorithm (ObSDA) for an application to optimize a type-2 fuzzy logic controller for an inverted pendulum system. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A novel MPPT algorithm for load protection based on output sensing control
Published 2011“…To address this drawback without the need to increase the number of sensors, a novel control system and tracking algorithm based on the output sensing control and P&O algorithm is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017Get full text
Get full text
Monograph
