Search Results - (( developing key issues algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- issues algorithm »
- java implication »
- implication tree »
- developing key »
- tree algorithm »
-
1
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
2
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
Get full text
Get full text
Thesis -
3
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
4
Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali
Published 2025“…This study explores the application of sentiment analysis using the Naive Bayes algorithm to understand public perceptions of marital issues, particularly factors contributing to the rising divorce rate. …”
Get full text
Get full text
Thesis -
5
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
Get full text
Get full text
Get full text
Thesis -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…In this thesis, a fast and configurable hardware implementation of the RSA algorithm for public key cryptography is presented that addresses the issues above. …”
Get full text
Get full text
Thesis -
7
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
8
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method.…”
Get full text
Get full text
Get full text
Article -
9
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…Temporal and spatial resolution are two key issues in the analysis of PIV data which often compromises each other. …”
Get full text
Get full text
Final Year Project -
10
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…One of the key issues of developing an autonomous system is that it requires pre-defined knowledge by an expert. …”
Get full text
Get full text
Thesis -
11
-
12
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…For safe curves of 384 and 512 bits, the developed ENPM algorithm over prime field outperformed the BM algorithm in terms of overall multiplications with 57.60% and 59.16% average running time. …”
Get full text
Get full text
Get full text
Thesis -
13
Application of sampling-based motion planning algorithms in autonomous vehicle navigation
Published 2016“…With the development of the autonomous driving technology, the autonomous vehicle has become one of the key issues for supporting our daily life and economical activities. …”
Get full text
Get full text
Get full text
Book Section -
14
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
Get full text
Get full text
Get full text
Article -
15
-
16
Review and bibliometric analysis of AI-driven advancements in healthcare
Published 2024“…Research shows that "algorithm", "machine learning", "deep learning", "controlled study", "major clinical study" and "healthcare delivery" as well as "decision support systems" are key topics for research. …”
Get full text
Get full text
Get full text
Article -
17
Crossover and mutation operators of genetic algorithms
Published 2017“…This paper concludes that the key issue in developing a GA is to deliver a balance between explorative and exploitative features that complies with the combination of operators in order to produce exceptional performance as a GA as a whole.…”
Get full text
Get full text
Get full text
Article -
18
MYMealPal: Malaysian healthy meal planner using artificial bee colony approach / Wan Muhamad Amirul Hakimi Wan Mohd Zaki
Published 2017“…This means that Malaysian people do not aware about how dangerous this issue could affect their lifestyle and health. Food choices and good nutrition is a key of healthy lifestyle. …”
Get full text
Get full text
Student Project -
19
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…By exchanging the generated public keys using one of the well known key exchange protocols, both parties can calculate a unique shared key. …”
Get full text
Get full text
Get full text
Article -
20
Modified spectral clustering algorithm for semisupervised face annotation modeling
Published 2025“…To improve accuracy, an optimized similarity matrix was developed. It also integrated MustLink (ML) and Cannot-Link (CL) constraints, generated efficiently via the Label Propagation Algorithm (LPA) enhanced by combining Share Nearest Neighbour (SNN) and Radial Basis Function (RBF). …”
Get full text
Get full text
Thesis
