Search Results - (( simulation optimization modified algorithm ) OR ( program implementation rsa algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    A Modified Simulated Kalman Filter Optimizer with State Measurement, Substitution Mutation, Hamming Distance Calculation, and 2-Opt Operator by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2021
    “…The simulated Kalman filter (SKF) is an algorithm for population-based optimization based on the Kalman filter framework. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Testing on real data sets showed consistency results as the simulated ones. Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2018
    “…This study introduces a novel meta-heuristic optimization algorithm known as quasi-oppositional modified Jaya (QOMJaya) to solve different multi-objective optimal power flow (MOOPF) problems. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  14. 14

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…In the fourth phase, the newly developed algorithm undergoes testing on the formulated ROOPs and compared to several contemporary optimizer algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Optimal power flow using the Jaya algorithm by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…Simulations are carried out on the modified IEEE 30-bus and IEEE 118-bus networks to determine the effectiveness of the Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An application of modified adaptive bats sonar algorithm (MABSA) on fuzzy logic controller for dc motor accuracy by Nurainaa, Elas

    Published 2021
    “…Therefore, this research presents works on the FLC system which is the fuzzy inference system that will be optimized by the modified adaptive bats sonar algorithm (MABSA) for the DC servo motor position control. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of modified adaptive bats sonar algorithm with doppler effect and levy flight (MABSA-DELF) to optimize mechanical engineering problems by Nur Naajihah, Ab Rahman, Nafrizuan, Mat Yahya, Mohd Haziq, Na'im Amin, Nur Iffah, Mohamed Azmi

    Published 2023
    “…This paper describes the application of the Modified Adaptive Bats Sonar Algorithm with Doppler Effect and Levy Flight (MABSA-DELF) to mechanical engineering design optimization issues. …”
    Get full text
    Get full text
    Get full text
    Article