Search Results - (( integer implementation developing algorithm ) OR ( its implementation using algorithm ))
Search alternatives:
- implementation developing »
- integer implementation »
- implementation using »
- its implementation »
- using algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
3
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
4
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011“…Stochastic optimization algorithms are a new breed of optimizers that have recently been developed. …”
Get full text
Get full text
Research Reports -
5
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Besides, these algorithms more frequently implemented with the lengthy and redundant fixed N length integer encoding. …”
Get full text
Get full text
Thesis -
6
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
7
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…CPU implementations are becoming less efficient in handling the computation of crypto algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…For high security, encryption is one of the methods used to protect data against leakage. CBC describes chaos theory as a measure of communication techniques and computational algorithms to perform different cryptographic tasks in a cryptographic system in specific physical dynamic systems operating in chaotic systems. …”
Get full text
Get full text
Get full text
Thesis -
9
Classification and visualization of Malaysian fast food restaurant chain based on twitter sentiment analysis / Muhammad Hafeez Hakimi Muhd Zahidi Ridzuan
Published 2023“…The methodology used in this project is known as the Modified Waterfall Model, which consists of four primary phases: requirement analysis, design, implementation, and testing. …”
Get full text
Get full text
Thesis -
10
Rational methods for solving first order ordinary differential equation
Published 2019“…Meanwhile, the second class uses a rational function with the numerator of degree one, as the degree of its denominator increases. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Approximation techniques
Published 2020“…This chapter will focus on practical realization or equivalent circuit implementation of the fractional-order systems and controllers in a finite-dimensional integer-order system. …”
Get full text
Get full text
Article -
14
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019“…Therefore, this research proposed an implementation of genetic algorithm (GA) with knowledge based operators as an alternative to approximate the solution.…”
Get full text
Get full text
Thesis -
15
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Triangular Coordinate Extraction (TCE) technique has also been introduced to extract the coordinates during the rotation of Hybrid Cube surface (HCs) and plays an important role in the development of KSAHC algorithm. The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
17
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
18
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A-star (A*) algorithm implementation for robotics path planning navigation
Published 2018“…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
Get full text
Get full text
Undergraduates Project Papers
