Search Results - ((((((based algorithm) OR (bat algorithm))) OR (rsa algorithm))) OR (_ algorithm))

Search alternatives:

Refine Results
  1. 1

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
    Get full text
    Get full text
    Thesis
  5. 5

    BAT-BP: A new BAT based back-propagation algorithm for efficient data classification by Mohd. Nawi, Nazri, M. Z., Rehman, Hafifi, Nurfarian, Khan, Abdullah, Siming, Insaf Ali

    Published 2016
    “…One of the nature inspired meta-heuristic Bat algorithm is becoming a popular method in solving many complex optimization problems. …”
    Get full text
    Get full text
    Article
  6. 6

    A New Bats Echolocation-based Algorithm for Single Objective Optimisation by N. M., Yahya, Tokhi, M. Osman, Kasdirin, Hyreil Anuar

    Published 2016
    “…Bats sonar algorithm (BSA) as a swarm intelligence approach utilises the concept of echolocation of bats to find prey. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor by Ramli, Mohamad Raziff, Abal Abas, Zuraida, Desa, Mohammad Ishak, Zainal Abidin, Zaheera, Al Azzam, Malik Bader Hasan

    Published 2019
    “…Benchmark test function is then performed for the basic Bat Algorithm and the modified Bat Algorithm (MBA) for comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…As a conclusion, the MAPE obtained for the Bat Algorithm based Multi-Layer Feedforward Neural Network is 4.79 in %.…”
    Get full text
    Get full text
    Article
  10. 10

    A Modified Bats Echolocation-Based Algorithm for Solving Constrained Optimisation Problems by N. M., Yahya, Tokhi, M. O.

    Published 2017
    “…A modified adaptive bats sonar algorithm (MABSA) is presented that utilises the concept of echolocation of a colony of bats to find prey. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…As a conclusion, the MAPE obtained for the Bat Algorithm based Multi-Layer Feedforward Neural Network is 4.79 in %.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm by Mohd Annuar, Khalil Azha, Selamat, Nur Asmiza, Jaafar, Hazriq Izzuan, Mohamad, Syahrul Hisham

    Published 2013
    “…Each bat in Bat Algorithm represents a candidate solution for the problem and each dimension in the search space of the Bat Algorithm represents a parameter of intrinsic parameters: skew, focal length, and magnification factor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  16. 16

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.…”
    Get full text
    Get full text
    Article
  17. 17

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…The Modified Adaptive Bats Sonar Algorithm (MABSA), initially designed for single objective optimization and inspired by colony bats' echolocation, has demonstrated efficiency with its simple structure and reduced computation time. …”
    Get full text
    Get full text
    Thesis