Search Results - (( based application ((cell algorithm) OR (rsa algorithm)) ) OR ( _ location based algorithm ))*

Refine Results
  1. 1

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau by Tan , Chee Hau

    Published 2020
    “…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…The model minimizes both inter-cell and intra-cell material handling cost. To solve the model, an algorithm based on Simulated Annealing (SA) is developed in C/C++ namely SA1. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9
  10. 10

    Content-based image retrieval of blood cells based on colour / Alagu Rathina Bairavi by Bairavi, Alagu Rathina

    Published 2009
    “…This study of image retrieval of blood cells based on colour generated good results for further prospective study. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Brain tumor quantification equation: modeled on complete step response algorithm by Aboaba, Abdulfattah A., Hameed, Shihab A., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Harun, Rahmat, Zain, Norzaini Rose Mohd

    Published 2012
    “…What is presented here is a novel brain tumor quantification method based on step response algorithm utilizing a model which itself was based on step response model resulting in smart and rapid quantification of brain tumor volume.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Self-organizing network technique for resource allocation and mobility management in LTE femtocell network / Labeeb Mohsin Abdullah by Abdullah, Labeeb Mohsin

    Published 2015
    “…The first experiment was conducted by applying two approaches i) graph colouring algorithm, ii) DLS scheme. The second experiment was to determine the femtocell location by using DSL scheme as well. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…The purpose of this project is to classify malaria parasites into Plasmodium falciparum, Plasmodium vivax and Plasmodium malariae based on ratio of infected red blood cell’s (RBC) size to normal RBC’s size, shape of parasite, location of chromatin, number of chromatin, texture of infected RBC, and number of parasite per RBC using different types of neural network. …”
    Get full text
    Get full text
    Monograph