Search Results - (( using function method algorithm ) OR ( program implementation rsa algorithm ))

Refine Results
  1. 1

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    The efficiency of conjugate gradient methods with global convergence / Siti Nur Hafiza Shamsudin by Shamsudin, Siti Nur Hafiza

    Published 2019
    “…The global convergence result is established using exact line searches. Numerical result shows that algorithm 2 which is one of the proposed CG methods is more efficiency when compared to other algorithms.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…It shows that the IQR-HEOM method is more efficient to rectify the problem caused by using range in HEOM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…As a result, the highest average accuracy generated which is 96.91% by using WBCD dataset. The average accuracy of Bat Algorithm is comparing with other methods. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga by Dada Emmanuel, Gbenga

    Published 2016
    “…Secondly, we compared the performance of our new algorithm pdAPSO with APSO, and PSO using 7 benchmark functions. …”
    Get full text
    Get full text
    Thesis
  20. 20