Search Results - (( wolf optimization max algorithm ) OR ( based operations ((risk algorithm) OR (rsa algorithm)) ))
Search alternatives:
- wolf optimization »
- optimization max »
- based operations »
- risk algorithm »
- max algorithm »
- rsa algorithm »
-
1
-
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
3
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014“…Data mining is a fundamental technique in identifying patterns from large data sets.The extracted facts and patterns contribute in various domains such as marketing, forecasting, and medical.Prior to that, data are consolidated so that the resulting mining process may be more efficient.This study investigates the effect of different data normalization techniques.which are Min-max, Z-score and decimal scaling, on Swarm-based forecasting models.Recent swarm intelligence algorithms employed includes the Grey Wolf Optimizer (GWO) and Artificial Bee Colony (ABC).Forecasting models are later developed to predict the daily spot price of crude oil and gasoline.Results showed that GWO works better with Z-score normalization technique while ABC produces better accuracy with the Min-Max.Nevertheless, the GWO is more superior than ABC as its model generates the highest accuracy for both crude oil and gasoline price.Such a result indicates that GWO is a promising competitor in the family of swarm intelligence algorithms.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
5
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Mathematical analysis is carried out to identify important features, advantages and disadvantages of the new signed-digit {0,1,3}-NAF scalar multiplication algorithm. Cost measurement is based on number of point operations per scalar throughout the execution of the scalar multiplication algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Elliptic curve method has shorter key size, smaller signature length, fast operations and high security working. Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
-
11
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…The encryption process for the AAβ cryptosystem is easy and fast as operations involved only add and multiply operations. …”
Get full text
Get full text
Get full text
Thesis -
13
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
14
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The result from the input data yielded the following results: The proposed algorithm has overall 86% speed up in comparison to the base algorithm. …”
Get full text
Get full text
Thesis -
15
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Utilizing self-organization systems for modeling and managing risk based on maintenance and repair in petrochemical industries
Published 2018“…Networks used in this study are self-organizing networks with constant weight, which include Kohonen networks. For this purpose, operation impact, operation flexibility, maintenance cost, impact of safety and environment and frequency parameters had been considered as input; and using this model, the risk level is calculated. …”
Get full text
Get full text
Article -
17
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
Published 2014“…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
Get full text
Get full text
Get full text
Article -
18
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…The results obtained for year 1987 - 2008 assessments showed the proposed MHAs as an optimistic conclusion for the dam operator to consider based on the trade-off between reliability and resilience or other reservoir risk indices. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…In this study, an attempt via metaheuristic algorithms, namely the Harris Hawks Optimisation (HHO) Algorithm and the Opposite Based Learning of HHO (OBL-HHO) are made to minimise the water deficit as well as mitigate floods at downstream of the Klang Gate Dam (KGD). …”
Article -
20
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…We conclude that public key systems based on IFS transformation perform more efficiently than RSA cryptosystems in terms of key size and key space.…”
Get full text
Get full text
Get full text
Article
