Search Results - (( developing intensive encryption algorithm ) OR ( java visualization tools algorithm ))
Search alternatives:
- developing intensive »
- visualization tools »
- java visualization »
- tools algorithm »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
2
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
4
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The processors perform their respective dedicated algorithm-intensive computations. This thesis presents the architecture for implementation of the new Advanced Encryption Standard (AES) in hardware for operating under SoC environment. …”
Get full text
Get full text
Thesis -
5
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…A study found that the visualization tools nowadays are not free, and it is expensive, so this system will help CoRe department in visualizing data. …”
Get full text
Get full text
Thesis -
6
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
7
-
8
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…These dedicated crypto IP cores, which are implemented as coprocessors, permit high-speed execution of the compute-intensive operations in AES encryption, ECC and RSAbased digital signature, and other PKI-enabling functions. …”
Get full text
Get full text
Get full text
Article -
9
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…This model can recognize and interpret baby signs based on visual input from the mobile phone’s camera in real time, and also includes a dictionary feature that can be a learning tool for parents and caregivers. …”
Get full text
Get full text
Get full text
Article
