Search Results - (( based location based algorithm ) OR ( some application ((rsa algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement Of Wifi Indoor Positioning System by Aboodi, Ahed Hussein

    Published 2011
    “…In this research, a new algorithm named (WBI) is proposed, based on the WiFi Received Signal Strength (RSS) technology. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A new algorithm for face localization and face features extraction based on Voronoi diagram and parametric contour by Mohamad, Dzulkifli, Cheddad, Abbas, Abd. Manaf, Azizah

    Published 2004
    “…Recognition of human faces out of many still images is a research field of fast increasing interest, and a fast and accurate algorithm is still a field to be explored. Our proposed approach in this research is based on Voronoi Diagram and contour linearization. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  15. 15

    Clustering of Indonesian forest fires using self organizing maps by Selamat, Ali, Selamat, Md. Hafiz

    Published 2006
    “…The input data is based on the quantity of the hot spots of forest fires that spread in several locations within ten months period. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Big Data Prediction Framework for Weather Temperature Based on MapReduce Algorithm by Khalid Adam, Ismail Hammad, Jasni, Mohamad Zain, Mazlina, Abdul Majid, Noor Akma, Abu Bakar

    Published 2016
    “…This project aims to build analytical Big Data prediction framework for weather temperature based on MapReduce algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…In the future, the efficiency of the result will be improved based on technology growth with adding some application such as GPS and map of the house in mobile version.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  20. 20