Search Results - (( wave application ((_ algorithm) OR (means algorithm)) ) OR ( some application rsa algorithm ))
Search alternatives:
- wave application »
- some application »
- means algorithm »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
4
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…The proposed algorithm exhibits reliable automated QTc measurement. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
6
Sactive Noise Control Technique Application in Air Conditioning Ducts
Published 2009“…An algorithm, ‘Hardware-Tuned Feedback ANC (HTFA)’, has been developed to implement the ANC technique for the noise reduction application in an air conditioning duct element, where Digital Signal Processing is used to sample noise and produce a complete anti-phase noise produced by the HTFA algorithm. …”
Get full text
Get full text
Thesis -
7
Interferometric array planning using division algorithm for radio astronomy applications
Published 2017“…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
8
-
9
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Article -
10
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
Simulation of undular bores evolution with damping
Published 2017Get full text
Get full text
Get full text
Article -
13
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
14
-
15
Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models
Published 2022“…Current practice for processing marine CSEM responses utilizes meshes-based algorithms. The ad hoc algorithms require high computational time to solve the integrals and linear equations. …”
Get full text
Get full text
Article -
16
-
17
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
18
A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data
Published 2021“…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
Get full text
Get full text
Article -
19
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
20
Development of a State-Space Observer for Active Noise Control Systems
Published 2009Get full text
Get full text
Thesis
