Search Results - (( web application optimized algorithm ) OR ( _ application ((rsa algorithm) OR (new algorithm)) ))

Refine Results
  1. 1
  2. 2

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This victorious nature makes Jaya Algorithm more powerful and significant as compared to any other contemporary optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20