Search Results - (( based application ((cell algorithm) OR (rsa algorithm)) ) OR ( _ location based algorithm ))*
Search alternatives:
- based application »
- cell algorithm »
- rsa algorithm »
- _ location »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
2
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
3
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…FLP’s research can be divided into the procedural approach, algorithmic approach, Virtual Reality (VR) and AR-based approaches. …”
Get full text
Get full text
Get full text
Thesis -
5
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…The model minimizes both inter-cell and intra-cell material handling cost. To solve the model, an algorithm based on Simulated Annealing (SA) is developed in C/C++ namely SA1. …”
Get full text
Get full text
Thesis -
6
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
Get full text
Get full text
Final Year Project -
7
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
10
Content-based image retrieval of blood cells based on colour / Alagu Rathina Bairavi
Published 2009“…This study of image retrieval of blood cells based on colour generated good results for further prospective study. …”
Get full text
Get full text
Thesis -
11
Brain tumor quantification equation: modeled on complete step response algorithm
Published 2012“…What is presented here is a novel brain tumor quantification method based on step response algorithm utilizing a model which itself was based on step response model resulting in smart and rapid quantification of brain tumor volume.…”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Self-organizing network technique for resource allocation and mobility management in LTE femtocell network / Labeeb Mohsin Abdullah
Published 2015“…The first experiment was conducted by applying two approaches i) graph colouring algorithm, ii) DLS scheme. The second experiment was to determine the femtocell location by using DSL scheme as well. …”
Get full text
Get full text
Thesis -
13
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
14
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
15
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
16
Autonomous reconnaissance mission: development of an algorithm for collaborative multi robot communication
Published 2010Get full text
Get full text
Proceeding Paper -
17
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
18
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
19
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
20
Application Of Neural Network In Malaria Parasites Classification
Published 2006“…The purpose of this project is to classify malaria parasites into Plasmodium falciparum, Plasmodium vivax and Plasmodium malariae based on ratio of infected red blood cell’s (RBC) size to normal RBC’s size, shape of parasite, location of chromatin, number of chromatin, texture of infected RBC, and number of parasite per RBC using different types of neural network. …”
Get full text
Get full text
Monograph
