Search Results - (( _ location modified algorithm ) OR ( based application ((rsa algorithm) OR (tree algorithm)) ))*

Refine Results
  1. 1

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15
  16. 16

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  17. 17

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2021
    “…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis