Search Results - (( its application design algorithm ) OR ( code application towards algorithm ))*
Search alternatives:
- application design »
- towards algorithm »
- design algorithm »
- code application »
- its application »
-
1
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Towards designing a blockchain-based model for e-book publishing
Published 2025Get full text
Get full text
Get full text
Article -
4
-
5
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Selective harmonic elimination (SHE) based 3-phase multilevel voltage source inverter (VSI) for standalone applications
Published 2019“…With the fundamental switching SHE-PWM, twelve non-linear, transcendental equations are generated, and they are optimally solved using the Hybrid Coded Genetic Algorithm to eliminate 11 (n − 1) lower-order harmonics. …”
Get full text
Get full text
Get full text
Article -
7
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
8
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
9
Challenges in multi-layer data security for video steganography
Published 2018Get full text
Get full text
Get full text
Article -
10
-
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
12
A multi-objective Spiral Dynamic algorithm and its application for PD design
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
17
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media
Published 2022“…Algorithmic problems form the core of computer science, and thus algorithm design and analysis is among its most fundamental elements. …”
Get full text
Get full text
Get full text
Teaching Resource
