Search Results - (( _ application ((acs algorithm) OR (means algorithm)) ) OR ( code application rsa algorithm ))*

Refine Results
  1. 1
  2. 2

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Facial image retrieval on semantic features using adaptive mean genetic algorithm by Shnan, Marwan Ali, Rassem, Taha H., Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…Finally, the features are selected using Adaptive Mean Genetic Algorithm (AMGA). In this study, the average PSNR value obtained after applying Wiener filter was 45.29. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
    Get full text
    Get full text
    Research Reports
  7. 7
  8. 8

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…In addition, the DFA-EDCA algorithm also provides an intra-AC differentiation mechanism to increase the back-off time randomness and achieve discrimination of the same traffic priority on different stations. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Regional precipitation trend analysis at the Langat River Basin, Selangor, Malaysia by Palizdan, Narges, Falamarzi, Yashar, Huang, Yuk Feng, Lee, Teang Shui, Ghazali, Abdul Halim

    Published 2014
    “…However, the application of two methods at this scale showed a significant trend only in the region AC1. …”
    Get full text
    Get full text
    Article
  16. 16

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Prediction of Oil Palm Yield Using Machine Learning in the Perspective of Fluctuating Weather and Soil Moisture Conditions: Evaluation of a Generic Workflow by Khan N., Kamaruddin M.A., Ullah Sheikh U., Zawawi M.H., Yusup Y., Bakht M.P., Mohamed Noor N.

    Published 2023
    “…It is concluded that the means of machine learning have great potential for the application to predict oil palm yield using weather and soil moisture data. � 2022 by the authors. …”
    Article
  19. 19

    Field theory analysis for wireless infrared system's error correction by Jatoi, M.A., Kamel, N., Ousta, F., Gardezi, S.J.S.

    Published 2014
    “…Wireless infrared communications (WIR) is explained as the light waves propagation in free space by means of infrared radiation which exists in 400-700nm.This range corresponds to high frequency range which is useful for higher data rate applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices by Saadeldin, Abuelgasim, Rashid, Muhammad Mahbubur, Shafie, Amir Akramin, Hasan, Tahsin Fuad

    Published 2024
    “…The system makes use of a custom-built vehicle detection algorithm based on the you only look once version 8 nano (YOLOv8n), combined with a deep association metric (DeepSORT) object tracking algorithm and an efficient vehicle counting method for accurate counting of vehicles in highway scenes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article