Search Results - (( java case selection algorithm ) OR ( basic computing rsa algorithm ))
Search alternatives:
- selection algorithm »
- basic computing »
- case selection »
- computing rsa »
- rsa algorithm »
- java »
-
1
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
3
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
4
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. …”
Get full text
Get full text
Get full text
Article -
5
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006Get full text
Get full text
Thesis -
6
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…By storing intermediated atabasesin to SPM-Tree Framework,the sequence database can be stored into memory and the index set may be built. Using Java as a case study, a series of experiment was conducted to select a suitable API class named Collections for this framework.The experimental results show that Separator Database always improves, exponentially in some cases, PrefixSpan with pseudoprojection. …”
Get full text
Thesis -
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…By storing intermediated atabasesin to SPM-Tree Framework,the sequence database can be stored into memory and the index set may be built. Using Java as a case study, a series of experiment was conducted to select a suitable API class named Collections for this framework.The experimental results show that Separator Database always improves, exponentially in some cases, PrefixSpan with pseudoprojection. …”
Get full text
Get full text
Thesis -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Over the past 40 years there has been a dramatic miniaturization in computer technology. If current trends continue, by the year 2020 the basic memory components of a computer will be the size of individual atoms. …”
Get full text
Get full text
Thesis -
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
Get full text
Get full text
Thesis -
13
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The three regression testing techniques are test cases selection (TCS), test suite minimization (TSM) and test cases prioritization (TCP). …”
Get full text
Get full text
Thesis -
14
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
