Search Results - (( ais implementation based algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- program implementation »
- implementation based »
- ais implementation »
- implementation rsa »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
6
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
7
-
8
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis -
9
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
Get full text
Get full text
Thesis -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Application of Artificial Intelligence In Smart City
Published 2021“…This study aims to study the effects of the implementation of AI in the smart city. The objectives of this study are to review the concepts of AI and smart city, conduct the Strength, Weakness, Opportunity, and Threat (SWOT) Analysis of deployment of AI in a smart city, and propose the future trends of AI implementation in a smart city. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
13
Facilitating English Language teaching through AI- based drama in Palestine
Published 2025“…The survey sought to capture their perspectives on AI, AI- based drama techniques, the impact of AI in EFL classrooms, and the challenges associated with its implementation. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). …”
Get full text
Get full text
Thesis -
16
Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases.
Published 2024“…However, implementing AI presents challenges, including inadequate regulations, potential algorithmic bias, and compatibility with Islamic legal values. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
18
Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman
Published 2012“…A variety of automatic knowledge acquisition or learning and adaptation concepts need to be established in speech recognition using AI approaches. These key concepts can only be implemented using artificial neural networks (ANNs) approach. …”
Get full text
Get full text
Book Section -
19
Anomaly detection for vision-based inspection
Published 2022“…The usage of Artificial Intelligence (AI) techniques in vision-based anomaly detection is gaining traction within the manufacturing industry for quality inspection purposes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
