Search Results - (( its ((application rsa) OR (application a)) algorithm ) OR ( wave application use algorithm ))
Search alternatives:
- wave application »
- application rsa »
- application use »
- application a »
- use algorithm »
-
1
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
2
-
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
-
7
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
10
Improvement of Auditory Brainstem Response (ABR) wave V amplitude using novel MLS nonlinear algorithm
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
11
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
12
-
13
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
14
Use of a non-linear algorithm to improve the maximum length sequence auditory brainstem response
Published 2012Get full text
Get full text
Proceeding Paper -
15
-
16
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
17
-
18
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…Next, a unique inverted error deviation (IED) control technique is incorporated into the main DC-link capacitor voltage regulation algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Efficient Numerical Modelling of Extreme Wave
Published 2020Get full text
Get full text
Final Year Project -
20
Efficient Numerical Modelling of Extreme Waves
Published 2020Get full text
Get full text
Final Year Project
