Search Results - (( deviation detection path algorithm ) OR ( program implementation rsa algorithm ))
Search alternatives:
- program implementation »
- deviation detection »
- implementation rsa »
- detection path »
- path algorithm »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
-
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
5
A self-contained real-time angle deviation detection and measurement technique for straight line quadrocopter navigation using accelerometer / Nor Hashim Mohd Arshad … [et al.]
Published 2014“…This project proposes a new real-time adaptive trajectory correction algorithm for quadrocopter, which could specifically detect angle deviation through the use of accelerometer to allow for corrective action.…”
Get full text
Get full text
Get full text
Book Section -
6
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
7
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
8
-
9
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment
Published 2019“…To evaluate the performance of the proposed method, the average and variance error deviation are calculated. The Euclidean distances of detected lines from ground truth are used to compare the accuracy of the proposed method. …”
Get full text
Get full text
Thesis
