Search Results - (( simulation optimization window algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- program implementation »
- implementation rsa »
- window algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
Get full text
Get full text
Get full text
Article -
6
Simulation for dynamic patients scheduling based on many objective optimization and coordinator
Published 2024“…Taking both aspects, optimization and dynamic utilization, we propose a simulation for dynamic patient scheduling based on multi-objective optimization, window, and coordinator. …”
Get full text
Get full text
Get full text
Article -
7
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
8
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…The Travelling Salesman Problem (TSP) is a well-known algorithmic problem its main objective is optimization. …”
Get full text
Get full text
Get full text
Article -
9
Development of an education simulator for particle swarm optimization in solving economic dispatch problems: article / Mohd Hafiz Mat Hussain
Published 2009“…The developed simulator incorporated particle swarm optimizations (PSO) to solve the ED problems. …”
Get full text
Get full text
Article -
10
Development of an education simulator for particle swarm optimization in solving economic dispatch problems / Mohd Hafiz Mat Hussain
Published 2009“…The developed simulator incorporated particle swarm optimizations (PSO) to solve the ED problems. …”
Get full text
Get full text
Thesis -
11
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
12
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
13
-
14
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. …”
Get full text
Get full text
Thesis -
15
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…Simulation results show that optimal current channel occupancy and price is well tracked by ADRP. …”
Get full text
Get full text
Thesis -
18
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
19
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
Get full text
Get full text
Get full text
Thesis -
20
An efficient unknown detection approach for RFID data stream management system
Published 2025“…The materials and methods employed include comprehensive simulations and real-world RFID data streams to validate the algorithm's effectiveness. …”
Get full text
Get full text
Get full text
Article
