Search Results - (( its application new algorithm ) OR ( some applications security algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
    Get full text
    Get full text
    Article
  12. 12

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…The application of traditional frangible glass panel and automatic system such as smoke detector or heat detector requires a human response to realise the existence of fire and to perceive and determine its severity. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION by Lee, Yi Lin

    Published 2004
    “…The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma by Mir, Asma

    Published 2020
    “…This study is an addendum to the previously reported results on optical solitons solely, in view of the fact that, its fundamental nature as well as its potential applications to optoelectronic communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers