Search Results - been ((((rsa algorithm) OR (tree algorithm))) OR (graph algorithm))
Search alternatives:
- graph algorithm »
- tree algorithm »
- rsa algorithm »
-
1
A hybrid algorithm for finding shortest path in network routing.
Published 2009“…Classical algorithms have been used to search over some space for finding the shortest paths problem between two points in a network and a minimal weight spanning tree for routing. …”
Get full text
Article -
2
Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system
Published 2021“…However, the traditional Dijkstra’s is not accurate and need more time to perform the path in order it should visit all the nodes in the graph. In this paper, the Dijkstra-ant colony algorithm (ACO) with binary search tree (BST) has been proposed. …”
Get full text
Get full text
Get full text
Article -
3
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2023Conference Paper -
4
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Another quantum algorithm for a minimum weight spanning tree in the graph was also designed. …”
Get full text
Get full text
Thesis -
5
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2015“…The 3D depth of vegetation has been measured near power transmission lines using stereo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
6
A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob
Published 2022“…A numerical example related to finding the optimal route that can minimize the cost of solving the medical waste management is provided to show the effectiveness of the Prim's and Kruskal's algorithms with IVBN. As a final step, a comparative study such as interval-valued neutrosophic minimum spanning tree (IVN-MST), interval-valued intuitionistic fuzzy minimum spanning tree (IVIF-MST) and interval-valued fuzzy minimum spanning tree (IVE-MST) is presented to point out the advantages of the proposed method over that of other existing algorithms. …”
Get full text
Get full text
Student Project -
7
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…Minimum Spanning Tree (MST), the most functional algorithm, described exclusively by the undirected graph in which all nodes are connected. …”
Get full text
Get full text
Get full text
Article -
8
Computationally-efficient path planning algorithms in obstacle-rich environments based on visibility graph method
Published 2018“…There are several existing path planning methods such as Visibility Graph (VG), Voronoi Diagram (VD), Potential Fields (PF) and Rapidly-Exploring Random Tree (RRT). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
10
Study On The Accuracy Of Tree’s Diameter Measurement By Laser Range Finder System
Published 2014“…The results obtained are the values of accuracy for the diameter measurement of a tree for different distances between the sensor and the tree measured which are presented in graphs. …”
Get full text
Get full text
Conference or Workshop Item -
11
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
12
Modified multi prime RSA cryptosystem
Published 2018“…Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhancement of RSA Key Generation Using Identity
Published 2015“…Therefore the Tripathi algorithm needs to be improved. Proposed algorithm called CLB-RSA has been implemented. …”
Get full text
Get full text
Get full text
Book Chapter -
14
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. …”
Get full text
Get full text
Article -
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
18
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
Get full text
Get full text
Get full text
Article -
19
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
20
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
Published 2015“…AES-128 has faster encryption and decryption time, low power consumption, faster in hardware and software implementation, and high throughput compared to RSA-2048. Moreover, AES-128 algorithm provides higher security compared to RSA-2048. …”
Get full text
Get full text
Thesis
