Search Results - (( developing public generation algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- generation algorithm »
- public generation »
- implication based »
- java implication »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…This project focused on three main objectives: to investigate dengue data and Clonal Selection Algorithm for classification of Dengue, to design and develops Clonal Selection Classification System (CSCS) and to evaluate Clonal Selection Classification System symptoms. …”
Get full text
Get full text
Thesis -
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
6
-
7
-
8
-
9
-
10
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
11
Wind farm layout design using cuckoo search algorithm
Published 2016“…In recent years, several attempts have been made to develop techniques and algorithms for optimization of wind farms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Genetic algorithms for urban transit routing problems
Published 2012“…Thus in this study, one such metaheuristic algorithm, genetic algorithm (GA) is developed to solve the UTRP. …”
Get full text
Get full text
Thesis -
13
Implementing a t-way test generation strategy using bees algorithm
Published 2023“…This paper discusses our experiences on implementation of Bees algorithm for generating test cases to detect t-way interaction faults (where t signifies the interaction strength). © SCRG Publication, 2013.…”
Article -
14
-
15
-
16
-
17
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…In Malaysia, electricity is primarily generated by burning fossil fuels, emitting greenhouse gases (GHG) that adversely impact the environment and public health. …”
Get full text
Get full text
Get full text
Article -
18
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. In this study, point m = (2,4) is chosen since it exists on the elliptic curve and will be calculated until 11G using double-and-add algorithm. …”
Get full text
Get full text
Student Project -
19
Evaluating different machine learning models for predicting municipal solid waste generation: a case study of Malaysia
Published 2025“…It is crucial for developing countries such as Malaysia to be able to accurately predict future municipal solid waste generations in order to achieve high-quality waste management. …”
Article -
20
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item
