Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
"conquer algorithm." » "computer algorithms."
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
"conquer algorithm." » "computer algorithms."
"cipher algorithm." » "filter algorithm.", "linear algorithm.", "faster algorithm."
1
“...Lightweight block cipher algorithms are vital for constrained environment. There are many...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
2
“...Lightweight block cipher algorithms are vital for
constrained environment. It is easy to propose...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
3
“... will determine the performance of an algorithm. A Divide-and-Conquer algorithm is the most efficient algorithm...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
4
by Tat Wi, Charomie
Published 2010
“..., Caesar cipher algorithm can be implemented in hybrid encryption project
to make data secure and better....”Published 2010
Get full text
Get full text
Undergraduates Project Papers
5
by Charomie, Tat Wi
Published 2010
“... which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can...”Published 2010
Get full text
Get full text
Get full text
Undergraduates Project Papers
6
7
8
by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem
Published 2015
“...Lightweight block cipher algorithms are vital
for constrained environment. There are three factors...”Published 2015
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
9
“...Lightweight block cipher algorithms are very important for constraint environment. This paper...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
10
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
11
12
13
“... control is presented in this paper. The fuzzy control algorithm for light tracking system...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
14
by Mnaathr, Satar Habib
Published 2010
“... control algorithm and to measure the TCP cognition control algorithm state over local area network...”Published 2010
Get full text
Get full text
Get full text
Get full text
Thesis
15
16
by Mohd. Yusof, Khairiyah, Hassim, Mimi Haryani, Tan, Sook Li, Ab. Rashid, Siti Rafidah
Published 2004
“... sophisticated control algorithms have been developed largely because it is able to deliver satisfactory...”Published 2004
Get full text
Get full text
Monograph
17
18
19
“... an extended lifetime for it. This paper proposes an improved control algorithm for a dynamic voltage restorer...”
Get full text
Get full text
20