Search Results - (( based location based algorithm ) OR ( some application ((use algorithm) OR (rsa algorithm)) ))*
Search alternatives:
- some application »
- based location »
- use algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement
Published 2011“…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
Get full text
Get full text
Thesis -
5
Enhancement Of Wifi Indoor Positioning System
Published 2011“…In this research, a new algorithm named (WBI) is proposed, based on the WiFi Received Signal Strength (RSS) technology. …”
Get full text
Get full text
Thesis -
6
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…Current map-based application for tourist used Global Positioning System (GPS) technologies that make it possible to track user movements and determine a user's current location. …”
Get full text
Get full text
Thesis -
7
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
Get full text
Get full text
Thesis -
8
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
9
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
Get full text
Get full text
Thesis -
10
-
11
Clustering of Indonesian forest fires using self organizing maps
Published 2006“…The input data is based on the quantity of the hot spots of forest fires that spread in several locations within ten months period. …”
Get full text
Get full text
Get full text
Article -
12
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
13
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A new algorithm for face localization and face features extraction based on Voronoi diagram and parametric contour
Published 2004“…Recognition of human faces out of many still images is a research field of fast increasing interest, and a fast and accurate algorithm is still a field to be explored. Our proposed approach in this research is based on Voronoi Diagram and contour linearization. …”
Get full text
Get full text
Get full text
Book Section -
15
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
17
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
18
-
19
Big Data Prediction Framework for Weather Temperature Based on MapReduce Algorithm
Published 2016“…This project aims to build analytical Big Data prediction framework for weather temperature based on MapReduce algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…The main objective for this research is to calculate the position of the object based on the distance using Wi-Fi Triangulation Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
