Search Results - (( using computer rsa algorithm ) OR ( simulation optimization path algorithm ))
Search alternatives:
- optimization path »
- path algorithm »
- rsa algorithm »
- computer rsa »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. The system is needed to be parallel as to overcome the problem of intensive computational by the RSA algorithm. …”
Get full text
Get full text
Final Year Project -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…A simulated robot in a simulated environment is used to test the algorithm that is to be developed. …”
Get full text
Get full text
Get full text
Article -
6
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
7
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Therefore, the IE algorithm exhibits significant potential for UAV path planning optimization…”
Get full text
Get full text
Thesis -
8
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…Each algorithm was tested to compute the shortest path, with results indicating that while all algorithms arrive at the same optimal route, their efficiency differs. …”
Get full text
Get full text
Thesis -
9
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
10
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
11
New algorithm for autonomous dynamic path planning in real-time intelligent robot car
Published 2017“…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
Get full text
Get full text
Get full text
Article -
12
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…The aim is to solve the above-mentioned problems via an optimization mechanism based upon the combination between runtime path prediction method and heuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Introducing S-index into factoring RSA modulus via Lucas sequences
Published 2017“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Get full text
Article -
14
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016“…The S-index pattern is very useful in designing an algorithm to factor RSA modulo. …”
Get full text
Get full text
Conference or Workshop Item -
15
Simulation of identifying shortest path walkway using particle swarm optimization (PSO)
Published 2012“…The purpose of this research is to present the development of the system of Simulation of Identifying Shortest Path Walkway using Particle Swarm Optimization(PSO). …”
Get full text
Get full text
Undergraduates Project Papers -
16
Modified multi prime RSA cryptosystem
Published 2018“…For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
RSA algorithm performance in short messaging system exchange environment
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Finally, the simulation was conducted by implementing a random algorithm to verify the proposed GA in terms of the mobile robot's minimum and maximum path lengths. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
20
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis
