Search Results - (( based applications ((rsa algorithm) OR (tree algorithm)) ) OR ( _ application out algorithm ))
Search alternatives:
- based applications »
- application out »
- tree algorithm »
- rsa algorithm »
- out algorithm »
-
1
-
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
3
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
4
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review emphasizes the effects and consumption of different algorithms in different image processing applications. …”
Get full text
Get full text
Get full text
Article -
5
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015Get full text
Get full text
Conference or Workshop Item -
6
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
11
Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves
Published 2023“…At the early infection stage, it is very difficult to diagnose the disease because infected trees do not exhibit any symptoms. Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
Get full text
Get full text
Get full text
Book Section -
12
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
13
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
14
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
15
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
16
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
17
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
18
Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms
Published 2021Get full text
Get full text
Final Year Project -
19
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
20
