Search Results - (( abc implementation developing algorithm ) OR ( program implementation rsa algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm: article / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…This paper present offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm. The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Article
  6. 6

    Offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm / Deezex Noor Ainizaa Abdullah by Abdullah, Deezex Noor Ainizaa

    Published 2009
    “…This paper present offline study on loss optimization in distribution networks using Artificial Bee Colony (ABC) algorithm. The study involves the development of Artificial Bee Colony (ABC) algorithm to implement loss minimization in a distribution system. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…An Artificial Bee Colony (ABC) algorithm is proposed for the problem. The performance of ABC is evaluated on existing datasets and compared with Scatter Search (SS) and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Optimal sizing and location of distributed generation for power loss minimization using bee colony algorithm by Mohamad Zunnurain Fauzi

    Published 2023
    “…Therefore, a method which is Artificial Bee Colony (ABC) algorithm is proposed in this project for the optimal location and size of DG used in minimizing power losses and improve voltage profile. …”
    text::Final Year Project
  14. 14
  15. 15

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Intelligent Modeling of Oil Consumption by Chiroma, Haruna, Abdulkareem, Sameem, Muaz, Sanah Abdullahi, Abubakar, Adamu I., Sutoyo, Edi, Mungad , Mungad, Saadi, Younes, Sari, Eka Novita, Tutut, Herawan

    Published 2015
    “…The limitations associated with Levenberg-Marquardt (LM) Neural Network (NN) motivated this research to optimize the parameters of NN through Artificial Bee Colony Algorithm (ABC-LM) to build a model for the prediction of oil consumption. …”
    Get full text
    Get full text
    Book Chapter
  17. 17
  18. 18
  19. 19

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A Metaheuristic Optimization Using Explosion Method On A Hybrid Pd2-Lqr Quadcopter Controller by Raihan, Mohamad Norherman Shauqie Mohamed

    Published 2021
    “…A comparative study with 8 well-known algorithms, PSO, ABC, GA, DE, MVO, MFO, FA, and STOA, was performed to evaluate the performance of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis