Search Results - (( some application a algorithm ) OR ( based application ((rsa algorithm) OR (tree algorithm)) ))*
Search alternatives:
- based application »
- some application »
- tree algorithm »
- application a »
- rsa algorithm »
- a algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
-
3
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
4
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
5
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
6
-
7
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
Get full text
Get full text
Get full text
Article -
8
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
12
Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob
Published 2006“…Therefore, the Minimax algorithm is not applicable. The players are human and a goal-based agent. …”
Get full text
Get full text
Thesis -
13
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
-
15
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
16
-
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
18
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
19
WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS
Published 2008“…This process is also known as thresholding. The Wavelet-DCT algorithm is integrated into a simulation of intra-frame coder in compliance with MPEG-2 standard. …”
Get full text
Get full text
Final Year Project -
20
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter
