Search Results - (( developing modul encryption algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations by Mohd Ali, Fakariah Hani, Mahmod, Ramlan, Rushdan, Mohammad, Abdullah, Ismail

    Published 2009
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Article
  4. 4

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  6. 6

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…A simple application is also developed to illustrate how to use this module to develop the user applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A secure message handler using microsoft cryptoapi by Eh Kan, Chessda Uttraphan

    Published 2003
    “…A simple application is also developed to illustrate how to use this module to develop the user applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…In this thesis, new algorithms are proposed for the key generation, encryption and decryption module of KD-3D-CA block cipher based on von Neumann (3D) cellular automata. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin by Shamsuddin, Shuhaimi

    Published 2003
    “…A software programming based on LabVIEW was developed for data processing and presentation. The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  17. 17

    Developing a prototype e-commerce application with credit card validation and secure transaction by M. A., Ameedeen

    Published 2005
    “…Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar by Baba, Mohd Dani, Ghodgaonkar, Deepak Kumar

    Published 2003
    “…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
    Get full text
    Get full text
    Research Reports
  19. 19
  20. 20