Search Results - (( web application ((rsa algorithm) OR (bat algorithm)) ) OR ( its location based algorithm ))
Search alternatives:
- web application »
- rsa algorithm »
- bat algorithm »
- its location »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
6
-
7
-
8
Autonomous path planning robot using geographical information
Published 2008“…The guidance algorithm is formed based on an initial direction and distance of the target location without considering the time taken by the robot to reach the desired destination. …”
Get full text
Learning Object -
9
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
11
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
12
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
13
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Path planning algorithms is very important in autonomous mobile robots, this is to ensure that the robot can travel to its target location independently with efficient usage of time and energy. …”
Get full text
Get full text
Final Year Project -
14
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
Get full text
Get full text
Thesis -
15
A coordinated design of PSSs and UPFC-based stabilizer using Genetic Algorithm
Published 2013Get full text
Conference or Workshop Item -
16
Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman
Published 2010“…The path finding algorithm will basically finds the best path and instructs the robot to moves to its location by keep on refreshing its positions. …”
Get full text
Get full text
Research Reports -
17
Balance and single line to ground fault location in electrical distribution system
Published 2011“…This paper outlines impedance based technique and its application for determining the location of a fault on a distribution system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
An enhanced distance vector-hop algorithm using new weighted location method for wireless sensor networks
Published 2020“…In the final phase, least squares are employed to address nonlinear equation, which will gain greater location errors. Aimed at addressing problems mentioned above, an enhanced DV-Hop algorithm based on weighted factor, along with new weighted least squares location technique, is proposed in this paper, and it is called WND-DV-Hop. …”
Get full text
Get full text
Get full text
Article -
20
Application of genetic algorithm in optimization of unified power flow controller parameters and its location in the power system network
Published 2013“…The GA is applied to find the optimal location of the UPFC and to tune its control parameters under different operating conditions. …”
Get full text
Get full text
Article
