Search Results - (( based applications ((usage algorithm) OR (rsa algorithm)) ) OR ( _ location based algorithm ))
Search alternatives:
- based applications »
- rsa algorithm »
- _ location »
-
1
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: Get full text
Get full text
Thesis -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
4
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…In this project, an algorithm will be developed to predict the amount of time needed for the incoming public bus to arrive, based on the current location of the bus and the current time. …”
Get full text
Get full text
Final Year Project -
5
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…In this study, we are looking at the performance of four graph-based path planning algorithms which is Breadth First Search, Depth First Search, Dijkstra and A*, when implemented in real world applications. …”
Get full text
Get full text
Final Year Project -
6
Context Aware Handover Algorithms For Mobile Positioning Systems
Published 2014“…This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery. …”
Get full text
Get full text
Get full text
Article -
7
Distance vector-hop range-free location algorithm for wireless sensor network
Published 2015“…These localization algorithms are used to measure the actual distances between nodes and eventually determine the respective locations. …”
Get full text
Get full text
Thesis -
8
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Due to its mobility nature with the addition of effective path planning, the AG is able to hover at each stop point, making it ideal for usage in crowded regions with high demand, emergency circumstances, and distant locations with no access to fixed base stations.…”
Get full text
Get full text
Get full text
Article -
9
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…They used the classical bootstrap method to estimate the bootstrap location and the scale parameters based on calculating the Mean of Squared Residual (MSR). …”
Get full text
Get full text
Thesis -
11
Indoor location estimation utilizing Wi-Fi Signals
Published 2020“…The simulation-based software will evaluate the estimation location and positioning of the user and will match to user’s precise location.…”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
15
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
16
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
17
Automated Accident Location Detection System (Extended)
Published 2013“…He will be continuing to do the server gateway, website system and implementation of algorithm in Automated Accident Location Detection System. …”
Get full text
Get full text
Final Year Project -
18
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
19
-
20
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis
