Search Results - (( based location based algorithm ) OR ( some application ((use algorithm) OR (rsa algorithm)) ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Genetic algorithm based method for optimal location placement of flexible ac transmission system devices for voltage profile improvement by Karami, Mahdi

    Published 2011
    “…This thesis present a genetic algorithm based method for placement of FACTS devices for voltage profile improvement. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement Of Wifi Indoor Positioning System by Aboodi, Ahed Hussein

    Published 2011
    “…In this research, a new algorithm named (WBI) is proposed, based on the WiFi Received Signal Strength (RSS) technology. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Current map-based application for tourist used Global Positioning System (GPS) technologies that make it possible to track user movements and determine a user's current location. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Clustering of Indonesian forest fires using self organizing maps by Selamat, Ali, Selamat, Md. Hafiz

    Published 2006
    “…The input data is based on the quantity of the hot spots of forest fires that spread in several locations within ten months period. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  13. 13
  14. 14

    A new algorithm for face localization and face features extraction based on Voronoi diagram and parametric contour by Mohamad, Dzulkifli, Cheddad, Abbas, Abd. Manaf, Azizah

    Published 2004
    “…Recognition of human faces out of many still images is a research field of fast increasing interest, and a fast and accurate algorithm is still a field to be explored. Our proposed approach in this research is based on Voronoi Diagram and contour linearization. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15
  16. 16

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  17. 17

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Big Data Prediction Framework for Weather Temperature Based on MapReduce Algorithm by Khalid Adam, Ismail Hammad, Jasni, Mohamad Zain, Mazlina, Abdul Majid, Noor Akma, Abu Bakar

    Published 2016
    “…This project aims to build analytical Big Data prediction framework for weather temperature based on MapReduce algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…The main objective for this research is to calculate the position of the object based on the distance using Wi-Fi Triangulation Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers