Search Results - (( using optimization path algorithm ) OR ( based computing rsa algorithm ))*

Refine Results
  1. 1
  2. 2

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    A RSA-type cryptosystem based on quartic polynomials by Wong, Tze Jin

    Published 2011
    “…By using this algorithm, the time for computations will be decreased. …”
    Get full text
    Get full text
    Thesis
  5. 5

    FPGA Implementation of RSA Public-Key Cryptographic Coprocessor by Hani, Mohamed Khalil, Shaikh-Husin, Nasir, Tan, Siang Lin

    Published 2000
    “…The algorithm is dependent on the computation of modular exponentials. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
    Article
  11. 11
  12. 12

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin, M. F. F., Ab Rashid, N. M. Zuki, N. M.

    Published 2018
    “…PSO is also compared with another algorithm like Whale Optimization Algorithm, Ant Lion Optimizer, Dragonfly Algorithm, Grasshopper Optimization Algorithm, Moth-flame Optimization and Sine Cosine Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system by Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2021
    “…This solution depending on applying the optimization on an optimal path while the traditional ACO is optimizing the random path based on the greedy algorithm hence we get the most optimal path. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Modeling and optimization of multi-holes drilling path using Particle Swarm Optimization by Ab Rashid, Mohd Fadzil Faisae, Nik Mohamed, Nik Mohd Zuki, Romlay, Fadhlur Rahman Mohd, Razali, Akhtar Razul, Asmizam, Mokhtar

    Published 2018
    “…Later the problem is optimized using Particle Swarm Optimization (PSO) and compared with other algorithms including the new metaheuristics algorithms. …”
    Get full text
    Get full text
    Research Report
  17. 17

    The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment by Kok, Kai Yit

    Published 2016
    “…Significant research has been conducted on Unmanned Aerial Vehicle (UAV) path planning using evolutionary algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Differential Evolution (DE), and Biogeographic-Based Optimization (BBO). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…Each algorithm was tested to compute the shortest path, with results indicating that while all algorithms arrive at the same optimal route, their efficiency differs. …”
    Get full text
    Get full text
    Thesis