Search Results - (( wave applications security algorithm ) OR ( based application designing algorithm ))*
Search alternatives:
- application designing »
- designing algorithm »
- wave applications »
- based application »
-
1
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…From the analysis, both Self-Shrinking and W7 generator succeeded all tests but, only W7 generator is adopted into the software application. Based on field-testing on designated sites, the system is user-friendly, reliable, secured, free error transmission and operates at low power of transmission.…”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As proof of concept, a Top-up printing system is developed and for interaction with the web interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
NFC secured online transaction in mobile computing business
Published 2012“…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
5
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023Book Chapter -
6
Dual authentication for bluetooth connection
Published 2014Get full text
Get full text
Get full text
Article -
7
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
8
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
-
11
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…Hence faster decryption algorithms are sought-after. In this paper we design a fast and efficient algorithm for the decryption of the new cryptosystem based on the Rabin primitive. …”
Get full text
Get full text
Get full text
Article -
12
Developing triad design algorithms based on compatible factorization
Published 2011Get full text
Get full text
Get full text
Monograph -
13
-
14
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
15
-
16
Effectiveness of nature-inspired algorithms using ANFIS for blade design optimization and wind turbine efficiency
Published 2019“…The performance of these three algorithms in obtaining the optimal blade design based on the Cp are investigated and compared. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
19
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…Evolutionary Algorithms (EAs) cover all the applications involving the use of Evolutionary Computation in electronic system design. …”
Get full text
Get full text
Get full text
Article -
20
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…For further assessment, the proposed design strategy is then employed to design a control law for an electrical DC drive velocity controller used as a benchmark problem for the recent PSO-based and genetic algorithm optimization (GAO)-based robust controllers. …”
Get full text
Get full text
Thesis
