Search Results - (( _ application path algorithm ) OR ( its application security algorithm ))*

Refine Results
  1. 1

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL by Shamsiah, Suhaili, Cleopatra Chundang, Niam, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…Hash functions are one of the cryptographies that can be used in both security design applications and protocol suites. A few distinct applications of hash algorithms are digital signatures, digital time stamping and the message integrity verification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimization of multi-holes drilling toolpath using tiki-taka algorithm by Norazlina, Abdul Rahman

    Published 2024
    “…Future research should prioritize exploring the potential of TTA for integration into automated manufacturing processes and its applicability in maximizing efficiency advantages in other optimization tasks.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of fast fourier transform based on twiddle factor using genetic algorithm on raspberry pi by Ghazi, Firas Faisal

    Published 2019
    “…The research work revolves around the 16-point Radix-4 Single Path Delay Feedback (R4SDF) for optimizing the pipelined Fast Fourier Transform (FFT) processor, which can be done by using both Single Objective Genetic Algorithm and Multi-Objective Genetic Algorithm , Nowadays in many areas of engineering and science are widely using FFT processors in most of their applications, thus, the modern science requires continuously new optimizations which includes the FFT processor to have a lower power consumption and a smaller size. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…In which the obstacles, start node and target node will be known in advance of starting the path planning algorithms. Based on the results of MATLAB simulation, the A* algorithm is the best algorithm in finding the shortest path with the least time taken. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20