Search Results - binary ((((((rsa algorithm) OR (path algorithm))) OR (_ algorithm))) OR (based algorithm))
Search alternatives:
- path algorithm »
- rsa algorithm »
-
1
A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail
Published 2006“…One of those is the Binary Method. In this project, we implemented a parallel version of this Binary Method. …”
Get full text
Get full text
Research Reports -
2
Guidance system based on Dijkstra-ant colony algorithm with binary search tree for indoor parking system
Published 2021“…This solution depending on applying the optimization on an optimal path while the traditional ACO is optimizing the random path based on the greedy algorithm hence we get the most optimal path. …”
Get full text
Get full text
Get full text
Article -
3
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…In this research, a new left-to-right recoding algorithm is proposed to convert a binary expansion into a new {0,1,3}-NAF representation. …”
Get full text
Get full text
Thesis -
4
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The result from the input data yielded the following results: The proposed algorithm has overall 86% speed up in comparison to the base algorithm. …”
Get full text
Get full text
Thesis -
5
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
Published 2022“…For safe curves of 283, 409, and 571 bits over binary field, upon comparison with BM algorithm, the developed ENPM algorithm to enhance computational efficiency of ECC displayed better performance in overall multiplications based on the following average values; 8.70%, 8.79%, and 8.85% respectively, thus successfully speeding up the running time by an average of 9.00%. …”
Get full text
Get full text
Get full text
Thesis -
6
Path planning algorithm for a car like robot based on MILP method
Published 2013“…This project is presents an algorithm for path planning optimal routes mobile robot “like a car” to a target in unknown environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…A novel methodology was used to compute simple heart risk scores called non-laboratory based heart risk score (NLHRS). The methodology is proposed as stacking ensemble ML and the best ML algorithms are used as a base learner to compute relative feature weights. …”
Get full text
Get full text
Thesis -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
9
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The designed hybrid architecture and framework were tested using the above quantum algorithms and the existing quantum algorithms. Implementing and simulating results are then represented based on the probabilistic hybrid algorithm in the case of linear array, binary heap and quantum search for dense and sparse graphs.…”
Get full text
Get full text
Thesis -
10
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
Published 2014“…Solinas (1997) proposes that the τ-adic Non-Adjacent Form (τ-NAF) is one of the most efficient algorithms used to compute scalar multiplications on Anomalous Binary curves. …”
Get full text
Get full text
Get full text
Article -
11
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
12
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018Subjects: “…Algorithms…”
Get full text
Get full text
Thesis -
13
The evolution and trend of chain code scheme
Published 2008“…This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
Get full text
Get full text
Get full text
Article -
14
A novel hybrid binary reconstruction algorithm for ultrasonic tomography
Published 2008“…The algorithm is capable to improve the noise in the conventional back-projection based algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection
Published 2026“…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A Multi-State Gravitational Search Algorithm for Combinatorial Optimization Problems
Published 2015“…The binary-based algorithms including the binary gravitational search algorithm (BGSA) were designed to solve discrete optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Finally, the proposed two algorithms using DRM to represent the scalar in ECSM involve binary form and NAF. …”
Get full text
Get full text
Get full text
Thesis -
18
Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions
Published 2018“…This paper presents the study on the application of Binary Search Algorithm (BSA) to determine the maximum power point under partially shaded photovoltaic system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Clustering for binary data sets by using genetic algorithm-incremental K-means
Published 2018“…For the purpose of this research, GA was combined with the Incremental Kmeans (IKM) algorithm to cluster the binary data streams. In GAIKM, the objective function was based on a few sufficient statistics that may be easily and quickly calculated on binary numbers. …”
Get full text
Get full text
Article -
20
Multi-State Particle Swarm Optimization for Discrete Combinatorial Optimization Problem
Published 2014“…The binary-based algorithms including the binary particle swarm optimization (BPSO) algorithm are proposed to solve discrete optimization problems. …”
Get full text
Get full text
Get full text
Article
