Search Results - (( mobile application ((use algorithm) OR (rsa algorithm)) ) OR ( _ application a algorithm ))
Search alternatives:
- use algorithm »
- rsa algorithm »
- application a »
- a algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
-
6
-
7
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…There are many types of scheme used in encrypting a message so that it can be sent to a particular receiver from a particular sender without the third party knowing the content of the message known as cryptosystem. …”
Get full text
Get full text
Research Reports -
8
-
9
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
10
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
11
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
12
Graphical user authentication algorithm for mobile banking user
Published 2018Get full text
Get full text
Get full text
Article -
13
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…In conclusion this paper is to develop a product recommender in marketplace mobile application using Collaborative Filter and the accuracy of the algorithm is measured using Mean Absolute Error…”
Get full text
Get full text
Thesis -
14
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A Mobile Application For Stock Price Prediction
Published 2021“…Novice investors are limited to specific investment knowledge and lack investment tools to gain wealth in the stocks’ markets. A mobile application for stock price prediction using time series algorithms is developed to tackle the problem mentioned. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Development of coordinating algorithm for rendezvous task of mobile robots
Published 2023“…The coordination of mobile robots is a crucial component in a variety of applications, including search and rescue, environmental monitoring, and transportation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013“…The objective of the project is to create a learning-based mobile application for learning to play an acoustic guitar. …”
Get full text
Get full text
Final Year Project -
19
-
20
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…By definition, a mobile robot is a type of robot that has capability to move in a certain kind of environment and generally used to accomplish certain tasks with some degrees of freedom (DoF). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
