Search Results - (( some applications rsa algorithm ) OR ( its applications based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  5. 5

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7
  8. 8

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  9. 9

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  10. 10

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
    Get full text
    Get full text
    Article
  15. 15

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20