Search Results - (( _ application based algorithm ) OR ( wave applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…In order to keep information secured while transmission, the system was incorporated with cipher algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma by Mir, Asma

    Published 2020
    “…This study is an addendum to the previously reported results on optical solitons solely, in view of the fact that, its fundamental nature as well as its potential applications to optoelectronic communication. Analytical results open up a new horizon of experiments with optical solitons to facilitate a soliton based optical communication system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application by Zainal Abidin, Zulkifli

    Published 2011
    “…Present paper intends to provide a detailed description of a new bio-inspired Metaheuristic Algorithm. Based on the detailed study of the Drosophila, the flowchart behaviour for the algorithm, code implementation, methodologies and simulation analysis, a novel Fly Optimization Algorithm (FOA) approach is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…In this study, we are looking at the performance of four graph-based path planning algorithms which is Breadth First Search, Depth First Search, Dijkstra and A*, when implemented in real world applications. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation by Alia, Osama Moh’d Radi

    Published 2011
    “…Various images from different application domains, including synthetic and real-world images, have been used in this thesis to show the applicability of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis