Search Results - (( wave application ((_ algorithm) OR (means algorithm)) ) OR ( code application rsa algorithm ))
Search alternatives:
- wave application »
- code application »
- means algorithm »
- application rsa »
- rsa algorithm »
-
1
-
2
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
3
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
4
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
Get full text
Get full text
Thesis -
5
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…The proposed algorithm exhibits reliable automated QTc measurement. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Sactive Noise Control Technique Application in Air Conditioning Ducts
Published 2009“…An algorithm, ‘Hardware-Tuned Feedback ANC (HTFA)’, has been developed to implement the ANC technique for the noise reduction application in an air conditioning duct element, where Digital Signal Processing is used to sample noise and produce a complete anti-phase noise produced by the HTFA algorithm. …”
Get full text
Get full text
Thesis -
7
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
8
-
9
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
10
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Article -
11
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Get full text
Article -
12
-
13
Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models
Published 2022“…Current practice for processing marine CSEM responses utilizes meshes-based algorithms. The ad hoc algorithms require high computational time to solve the integrals and linear equations. …”
Get full text
Get full text
Article -
14
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
15
-
16
A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data
Published 2021“…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
Get full text
Get full text
Article -
17
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
18
Development of a State-Space Observer for Active Noise Control Systems
Published 2009Get full text
Get full text
Thesis -
19
-
20
Field theory analysis for wireless infrared system's error correction
Published 2014“…Wireless infrared communications (WIR) is explained as the light waves propagation in free space by means of infrared radiation which exists in 400-700nm.This range corresponds to high frequency range which is useful for higher data rate applications. …”
Get full text
Get full text
Conference or Workshop Item
