Search Results - ((((rsa algorithm) OR (bees algorithm))) OR (((based algorithm) OR (_ algorithm))))

Refine Results
  1. 1

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancement of RSA Key Generation Using Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman, Mohd Fadhil, Ramle

    Published 2015
    “…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function by Hammash, Nayif Mohammed

    Published 2012
    “…This thesis presents the parallel Bees Algorithm as a new approach for optimizing the last results for the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…Hence, a hybrid optimization algorithm called Artificial Bee Rabbit Optimization (ABRO) is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.…”
    Get full text
    Get full text
    Article
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Formulation of metaheuristic algorithms based on artificial bee colony for engineering problems by Lee, Wei Wen

    Published 2024
    “…The Artificial Bee Colony (ABC) algorithm is a powerful metaheuristic optimization technique inspired by the honeybee foraging behaviour. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Application of the bees algorithm for constrained mechanical design optimisation problem by Kamaruddin, Shafie, Abd Latif, Mohd Arif Hafizi

    Published 2019
    “…Nowadays, many optimisation algorithms have been introduced due to the advancement of technology such as Teaching Learning Based Optimisation (TLBO), Ant Colony Optimisation (ACO), Particle Swarm Optimisation (PSO) and the Bees Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Using the bees algorithm to optimise a support vector machine for wood defect classification by Pham, D.T, Muhammad, Zaidi, Mahmuddin, Massudi, Ghanbarzadeh, Afshin, Koc, Ebubekir, Otri, Sameh

    Published 2007
    “…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimal design of step – cone pulley problem using the bees algorithm by Yusof, Noor Jazilah, Kamaruddin, Shafie

    Published 2021
    “…Most of these algorithms were developed based on the collective behavior of social swarms of ants, bees, a flock of birds, and schools of fish. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Leaf lesion classification (LLC) algorithm based on artificial bee colony (ABC) by Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana, Sainin, Mohd Shamrie, Airuddin, Ahmad

    Published 2015
    “…In this paper, an algorithm to classify leaf disease severity based on lesions is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    FPGA Implementation of RSA Public-Key Cryptographic Coprocessor by Hani, Mohamed Khalil, Shaikh-Husin, Nasir, Tan, Siang Lin

    Published 2000
    “…The hardware implementation of the RSA algorithm for public-key cryptography is presented. …”
    Get full text
    Get full text
    Article
  19. 19

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
    Article
  20. 20

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article