Search Results - (( _ ((application tree) OR (application need)) algorithm ) OR ( web application rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency by Ramli, Muhammad Shahrul Azwan, Zainal Abidin, Mohamad Shukri, Hasan, Nor Shahida, Md Reba, Mohd Nadzri, Kolawole, Keshinro Kazeem, Ardiansyah, Rizqi Andry, Mpuhus, Sikudhan Lucas

    Published 2024
    “…The results showed that the RL-Irr reduced water use by up to 75 percent while maintaining tree growth. These findings suggest the algorithm could significantly improve water efficiency in durian farming, though real-world applications should consider potential model limitations…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM by ABDUL HALIM, ABDUL HANIF

    Published 2018
    “…These components need to be balanced in order to improve the algorithm performance with smaller variance of solution under repetitive trials, faster convergence towards global optimum and thus with lesser computation cost. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan Abdul Manan by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…Wireless Sensor Networks (WSNs) is becoming more important in various application areas. Many application scenarios require connectivity between WSN’s nodes to transmit the collected data to a sink node. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…The result of this application using the sample credit card approval dataset includes a decision tree, a set of rules derived from the decision tree and its accuracy. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun, Othman, Mohd Azlishah, Ismail, Mohd Muzafar, Misran, Mohamad Harris, Meor Said, Maizatul Alice, Ramlee, Ridza Azri

    Published 2013
    “…In order to perform fast collision detection technique in Virtual Environment Application, researchers need to maintain the behaviour of the object itself before the objects come into contact. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Analysis and comparison of classification algorithms for credit approval in Islamic banks by Pebrianti, Dwi, Wijanarko, Whena, Bayuaji, Luhur, Toha, Siti Fauziah

    Published 2025
    “…Conversely, the C4.5 algorithm achieved a balanced performance with a testing accuracy of 74.5%, making it a promising candidate for practical application in Sharia-compliant credit risk assessment. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Deploying clustered wireless sensor network by multi-robot system by Arezoumand, Reza, Mashohor, Syamsiah

    Published 2014
    “…In many applications there is also need to deploy sink other than wireless sensor nodes which sink deployment is another issue. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2021
    “…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
    Get full text
    Get full text
    Conference or Workshop Item