Search Results - been ((((rsa algorithm) OR (tree algorithm))) OR (graph algorithm))

Refine Results
  1. 1

    A hybrid algorithm for finding shortest path in network routing. by Soltan Aghaei, Mohammad Reza, Ahmad Zulkarnain, Zuriati, Mamat, Ali, Zainuddin, Hishamuddin

    Published 2009
    “…Classical algorithms have been used to search over some space for finding the shortest paths problem between two points in a network and a minimal weight spanning tree for routing. …”
    Get full text
    Article
  2. 2

    Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system by Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2021
    “…However, the traditional Dijkstra’s is not accurate and need more time to perform the path in order it should visit all the nodes in the graph. In this paper, the Dijkstra-ant colony algorithm (ACO) with binary search tree (BST) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…Another quantum algorithm for a minimum weight spanning tree in the graph was also designed. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob by Ahmad Hayazim, Nur Haifa, Zulkifli, Siti Nurain, Yaacob, Siti Nurhidayah

    Published 2022
    “…A numerical example related to finding the optimal route that can minimize the cost of solving the medical waste management is provided to show the effectiveness of the Prim's and Kruskal's algorithms with IVBN. As a final step, a comparative study such as interval-valued neutrosophic minimum spanning tree (IVN-MST), interval-valued intuitionistic fuzzy minimum spanning tree (IVIF-MST) and interval-valued fuzzy minimum spanning tree (IVE-MST) is presented to point out the advantages of the proposed method over that of other existing algorithms. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…Minimum Spanning Tree (MST), the most functional algorithm, described exclusively by the undirected graph in which all nodes are connected. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Computationally-efficient path planning algorithms in obstacle-rich environments based on visibility graph method by Abdul Latip, Nor Badariyah

    Published 2018
    “…There are several existing path planning methods such as Visibility Graph (VG), Voronoi Diagram (VD), Potential Fields (PF) and Rapidly-Exploring Random Tree (RRT). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Study On The Accuracy Of Tree’s Diameter Measurement By Laser Range Finder System by Mohd Rusdy, Yaacob, Miskon, Muhammad Fahmi, Chan, Xin Zhi

    Published 2014
    “…The results obtained are the values of accuracy for the diameter measurement of a tree for different distances between the sensor and the tree measured which are presented in graphs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Modified multi prime RSA cryptosystem by Kamardan, M. Ghazali, Aminudin, N., Che-Him, Norziha, Sufahani, Suliadi, Khalid, Kamil, Roslan, Rozaini

    Published 2018
    “…Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…Therefore the Tripathi algorithm needs to be improved. Proposed algorithm called CLB-RSA has been implemented. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms have been compared for identifying the most lightweight, secure, efficient implementation in IoT. …”
    Get full text
    Get full text
    Article
  17. 17

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Introducing S-index into factoring RSA modulus via Lucas sequences by Abu, Nur Azman, Salim, Fadzilah, Kamel Ariffin, Muhammad Rezal

    Published 2017
    “…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A comparative S-index in factoring RSA modulus via Lucas sequences by Abu, Nur Azman, Abdul Latip, Shekh Faisal, Kamel Ariffin, Muhammad Rezal

    Published 2016
    “…The success of factoring few large RSA modulo within the last few decades has been due to computing prowess overcoming one strong prime of RSA modulo. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…AES-128 has faster encryption and decryption time, low power consumption, faster in hardware and software implementation, and high throughput compared to RSA-2048. Moreover, AES-128 algorithm provides higher security compared to RSA-2048. …”
    Get full text
    Get full text
    Thesis