Search Results - (( wave application means algorithm ) OR ( web application ((rsa algorithm) OR (bat algorithm)) ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3
  4. 4

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Sactive Noise Control Technique Application in Air Conditioning Ducts by Decruz, Aloysius

    Published 2009
    “…An algorithm, ‘Hardware-Tuned Feedback ANC (HTFA)’, has been developed to implement the ANC technique for the noise reduction application in an air conditioning duct element, where Digital Signal Processing is used to sample noise and produce a complete anti-phase noise produced by the HTFA algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach by Jumahat, Shaliza, Gan, Kok Beng, Misran, Norbahiah, Islam, Mohammad Tariqul, Mahri, Nurhafizah, Ja'afar, Mohd. Hasni

    Published 2020
    “…Besides insensitive to morphological variations of ECG waves, the computational method is simple and possibly implemented as the basis for future software development for portable device applications.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models by Mohd Aris, M.N., Daud, H., Mohd Noh, K.A., Dass, S.C.

    Published 2022
    “…Seabed logging (SBL) is an application of controlled-source electromagnetic (CSEM) waves to discover marine hydrocarbon-filled reservoirs based on the resistivity contrast of subsurface underneath the seabed. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Field theory analysis for wireless infrared system's error correction by Jatoi, M.A., Kamel, N., Ousta, F., Gardezi, S.J.S.

    Published 2014
    “…Wireless infrared communications (WIR) is explained as the light waves propagation in free space by means of infrared radiation which exists in 400-700nm.This range corresponds to high frequency range which is useful for higher data rate applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Model verification of all method and model proposed in this study are examined using the simulation study. As illustration, applications are displayed using wind and wave circular data sets.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Seabed logging (SBL) is an application of electromagnetic (EM) waves for detecting potential marine hydrocarbon-saturated reservoirs reliant on a source-receiver system. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Seismic input optimisation for Joint Migration Inversion on complex structures, Malay Basin by Hairi, H.H., Md Rafek, A.G., Abdul Latiff, A.H.

    Published 2017
    “…Joint Migration Inversion make use of a Closed-Loop imaging process which means that less wave energy is wasted during processing making the final image more consistent with the input data. …”
    Get full text
    Get full text
    Article