Search Results - (( evolution optimization using algorithm ) OR ( problem implementation rsa algorithm ))

Refine Results
  1. 1

    Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran, Mohamed, Raihani

    Published 2018
    “…An exhaustive searching process of finding an optimal parameter value is another challenge. Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak by Kabulanto, Nur Fatimah, Abdul Razak, Farah Aina

    Published 2018
    “…Many innovative ideas for RSA Cryptosystem have been presented for the past two decades, and many corresponding problems remain to be resolved. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Extending Pollard class of factorable RSA modulus by Abd Ghafar, Amir Hamzah, Kamel Ariffin, Muhammad Rezal, Asbullah, Muhammad Asyraf

    Published 2018
    “…This is a reason why implementation in key generation algorithm of RSA cryptosystem requires its primes, p and q not to be constituted by small primes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI) by CHEW, JUNYEE

    Published 2004
    “…A major problem faced in this implementation has been solved while implementing the new logistic map scheme. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…We presented hybrid genetic algorithm for optimizing weights as well as the topology of artificial neural networks, by introducing the concepts of Lamarckian and Baldwin evolution effects. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The first level searches for the appropriate model order while the second level computes the optimal/sub-optimal corresponding parameters. The performance of the algorithm is evaluated using both simulated ARMA models and practical rotary motion system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm by Salami, Momoh Jimoh Eyiomika, Tijani, Ismaila, Isqeel , Abdullateef Ayodele, Aibinu, Abiodun Musa

    Published 2013
    “…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Crossover-first differential evolution for improved global optimization in non-uniform search landscapes by Teo, Jason Tze Wi, Mohd Hanafi Ahmad Hijazi, Hui, Keng Lau, Salmah Fattah, Aslina Baharum

    Published 2015
    “…The differential evolution (DE) algorithm is currently one of the most widely used evolutionary-based optimizers for global optimization due to its simplicity, robustness and efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy by Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Abdalla, Ahmed N.

    Published 2019
    “…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Performance comparison of differential evolution and particle swarm optimization in constrained optimization by Iwan, Mahmud, Akmeliawati, Rini, Faisal, Tarig, Al-Assadi, Hayder M.A.A.

    Published 2012
    “…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Multiobjective optimization of bioethanol production via hydrolysis using hopfield- enhanced differential evolution by Ganesan, T., Elamvazuthi, I., Shaari, K.Z.K., Vasant, P.

    Published 2014
    “…In this chapter, the weighted sum scalarization approach is used in conjunction with three meta-heuristic algorithms: Differential Evolution (DE), Hopfield-Enhanced Differential Evolution (HEDE), and Gravitational Search Algorithm (GSA). …”
    Get full text
    Get full text
    Book