Search Results - (( program implementation rsa algorithm ) OR ( abc implementation modified algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Adaptive filtering of EEG/ERP through bounded range artificial Bee Colony (BR-ABC) algorithm by Ahirwal, M.K., Kumar, A., Singh, G.K.

    Published 2014
    “…In this paper, the Artificial Bee Colony (ABC) algorithm is applied to construct Adaptive Noise Canceller (ANC) for electroencephalogram (EEG)/Event Related Potential (ERP) filtering with modified range selection, described as Bounded Range ABC (BR-ABC). …”
    Get full text
    Get full text
    Article
  5. 5

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Minimizing power loss using modified artificial bee colony algorithm / Nur Azlin Ashiqin Mohd Amin ...[et al.] by Mohd Amin, Nur Azlin Ashiqin, Jamaluddin, Siti Hafawati, Muhammat Pazil, Nur Syuhada, Mahmud, Norwaziah, Kimpol, Norhanisa

    Published 2021
    “…The power loss results are quite productive, and the algorithm is the most efficient than the other methods such as ABC algorithm and FA algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…Subsequently, the modified optimization is implemented in order to find the optimum system splitting solution which ensures minimal power flow disruption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis