Search Results - (( solution validation using algorithm ) OR ( program implementation rsa algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Cubature kalman optimizer : A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai, Tsuboi, Yusei

    Published 2023
    “…To further validate the performance, the proposed CKO is compared with well-known algorithms, including single-agent finite impulse response optimizer (SAFIRO), single-solution simulated Kalman filter (ssSKF), simulated Kalman filter (SKF), asynchronous simulated Kalman filter (ASKF), particle swarm optimization algorithm (PSO), genetic algorithm (GA), grey wolf optimization algorithm (GWO), and black hole algorithm (BH). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multiple Objective Optimization of Green Logistics Using Cuckoo Searching Algorithm by Wang, Wei, Liu, Yao

    Published 2016
    “…MATLAB software is used to validate and evaluate the proposed model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development Of Analytical Solution For Thermo-Mechanical Stresses Of Multilayered Pressure Vessel Based On Recursive Algorithm by Sim, Lih Chi

    Published 2022
    “…Recent studies showed that analytical solution based on recursive algorithm can be used to obtain thermo-mechanical stresses of multilayered structure efficiently. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Multi-Objective Search Group Algorithm for engineering design problems by Huy, T.H.B., Nallagownden, P., Truong, K.H., Kannan, R., Vo, D.N., Ho, N.

    Published 2022
    “…The Pareto archive with a selection mechanism is used to preserve and enhance the convergence and diversity of solutions. …”
    Get full text
    Get full text
    Article
  14. 14

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…To evaluate the efficiency of the Jaya Algorithm (JA) against another metaheuristic algorithm, Sine-Cosine Algorithm (SCA), both algorithms are tested and assessed for the TF problem solution using an ACM dataset containing experts and their skills. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of a multi-objective optimization model for transport and environment in a closed-loop automotive supply chain by Sadrnia, Abdolhossein

    Published 2014
    “…In the last stage, an extended Gravitational Search Algorithm (GSA) as a parallel search algorithm and high convergence rate into high quality final solutions is used to solve the proposed mathematical model and to achieve the Pareto set of solution. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
    Get full text
    Get full text
    Book Section
  19. 19
  20. 20

    Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad by Ahmad Fuad, Ahida Waliyyah

    Published 2024
    “…The results demonstrate that the BILP model and B&B algorithm effectively and efficiently find valid solutions to these puzzles, confirming their robustness and accuracy. …”
    Get full text
    Get full text
    Thesis