Search Results - (( developing control rsa algorithm ) OR ( java implication _ algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    A study of watermarking methods in medical application by Ng, Lee Ping

    Published 2004
    “…These three methods that being studied are better for integrity control. Meanwhile, a Graphic User Interface (GUI) is developed for embedding and extracting purpose. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…This system is based on real-time processing infrastructure, systems control and design. In existing survey, several mechanisim/solutionms were developed for reliable delivery of data without any attack. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.1 In network. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6