Search Results - (( based application design algorithm ) OR ( _ application ((rsa algorithm) OR (tree algorithm)) ))
Search alternatives:
- application design »
- based application »
- design algorithm »
- tree algorithm »
- rsa algorithm »
-
1
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
4
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…This application generates possible solutions for planting lining design. …”
Get full text
Get full text
Thesis -
5
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
6
-
7
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Simulation results show that the proposed algorithm converges and outperforms a source based tree algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency
Published 2024“…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
Get full text
Get full text
Get full text
Article -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
An extended ID3 decision tree algorithm for spatial data
Published 2011Get full text
Get full text
Conference or Workshop Item -
11
-
12
Tree-based machine learning in classifying reverse migration/ Azreen Anuar, Nur Huzeima Mohd Hussain and Hugh Byrd
Published 2023“…Based on the accuracy and AUC results, Gradient Boosted Trees is selected as the best algorithm. …”
Get full text
Get full text
Get full text
Article -
13
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
14
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…The ID3 algorithm which is originally designed for a non-spatial dataset has been improved to construct a spatial decision tree from a spatial dataset containing discrete features (points, lines and polygons). …”
Get full text
Get full text
Get full text
Article -
15
-
16
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
17
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
18
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006Get full text
Get full text
Article -
19
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The objective of this research is to introduce an efficient implementation of {0,1, 3}-NAF scalar recoding algorithm by implementing block method. With block method application on the based algorithm, a complex look up table is undesired. …”
Get full text
Get full text
Thesis -
20
