Search Results - (( _ application use algorithm ) OR ( mobile application ((rsa algorithm) OR (based algorithm)) ))*
Search alternatives:
- application use »
- use algorithm »
- rsa algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
6
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
8
-
9
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
10
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
11
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…When compared with RSSI based handover algorithm and mobility improved handover (MIHO) algorithm, respectively, FuzSAHO reduces the number of handovers by 12.5 and 7.5 %, respectively, when the MS velocity is <17 m/s. …”
Get full text
Get full text
Article -
12
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
14
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A vertical handover management for mobile telemedicine system using heterogeneous wireless networks
Published 2016“…In this paper, a novel telemedicine based handover decision making (THODM) algorithm is proposed for mobile telemedicine system using heterogeneous wireless networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
18
Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm
Published 2023“…Hence, a semi-dynamic obstacle with better optimization solutions is crucial to cope with mobile robots in the industry environment. Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015“…This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013“…The objective of the project is to create a learning-based mobile application for learning to play an acoustic guitar. …”
Get full text
Get full text
Final Year Project
