Search Results - (( ((wave application) OR (vr application)) among algorithm ) OR ( web application rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Enhancing unity-based AR with optimal lossless compression for digital twin assets by Hlayel, Mohammed, Hairulnizam, Mahdin, Hayajneh, Mohammad, AlDaajeh, Saleh H., Siti Salwani, Yaacob, Mazidah, Mat Rejab

    Published 2024
    “…This study also creates mathematical models for predicting resource utilization, like RAM and CPU time, required by AR mobile applications. Experimental results show a detailed comparison among these compression algorithms, which can give insights and help choose the best method according to the compression ratio, decompression speed, and resource usage. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cardiac abnormality prediction using tansig based multilayer perceptron by Mohanty, Sibani Priyadarshini, Syahrull Hi-Fi Syam Ahmad Jamil, Jailani Abdul Kadir, Mohd Salman Mohd Sabri, Fakroul Ridzuan Hashim

    Published 2021
    “…This reference parameter is better known as the input parameter to the ANN to detect cardiac abnormalities, among which are the of the height of peak/wave (amplitude) and time occurrence of peak/wave (duration of time) extracted from the electrocardiogram (ECG) signal. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20