Search Results - (( program implementation rsa algorithm ) OR ( based optimization model algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…Instead of solving the original optimal control problem, the model-based optimal control problem is solved. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Modeling and optimization of cost-based hybrid flow shop scheduling problem using metaheuristics by Ullah, Wasif, Mohd Fadzil Faisae, Ab Rashid, Muhammad Ammar, Nik Mu’tasim

    Published 2023
    “…Besides this, CPU time for PSO was very high compared to other algorithms. In the future, other optimization algorithms will be tested for the CHFS model, such as Teaching Learning Based Optimization (TLBO) and the Crayfish Optimization Algorithm (COA).…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Single-objective and multi-objective optimization algorithms based on sperm fertilization procedure / Hisham Ahmad Theeb Shehadeh by Hisham Ahmad, Theeb Shehadeh

    Published 2018
    “…In this work, Single Objective Optimization Algorithm (SOOA) is proposed. The SOOA version is extended to Multi Objective Optimization Algorithm (MOOA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…This study presents the development of Firefly Algorithm-based Sizing Algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…This study presents the development of firefly algorithm-based sizing algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Diagnosis of Poor Control Loop Performance: Development of a Model Based Compensation Algorithm for Control Valve Stiction Nonlinearity by N. Narayanasamy, Anand

    Published 2016
    “…The objective of this paper is to develop a model based compensation algorithm using optimization approach of MIQP based MPC backlash compensator for control valve stiction nonlinearity. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq by Al‑Aqeeli, Yousif H., Lee, Teang Shui, Abd Aziz, Samsuzana

    Published 2016
    “…The purpose of this study was to formulate and improve an approach of a genetic algorithm optimization model (GAOM) in order to increase the maximization of annual hydropower generation for a single reservoir. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20