Search Results - (( based location based algorithm ) OR ( some application ((rsa algorithm) OR (tree algorithm)) ))*
Search alternatives:
- some application »
- based location »
- tree algorithm »
- rsa algorithm »
-
1
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
4
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. …”
Get full text
Get full text
Article -
5
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
6
-
7
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
8
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
9
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
10
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
11
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: Get full text
Get full text
Thesis -
12
Enhanced location and positioning in wimax networks with virtual mimo base station
Published 2015“…Furthermore, a new hybrid algorithm enhancement of mobile station (MS) location estimation by using a single MIMO base station (SMBS) with the virtual base station has been introduced. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Extreme learning machine for user location prediction in mobile environment
Published 2011“…Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
17
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
Improved Location And Positioning Utilizing Single MIMO Base Station In IMT-Advanced System
Published 2016“…The Single MIMO Base Station (SMBS) in mobile WiMAX is combined with a virtual technique, known as the Virtual Base Stations, created a novel algorithm for location and positioning (L&P) purposes. …”
Get full text
Get full text
Get full text
Article -
20
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Indoor localisation techniques in multi-floor environments are emerging for location based service applications. Developing an accurate location determination and time-efficient technique is crucial for online location estimation of the multi-floor localisation system. …”
Get full text
Get full text
Thesis
