Search Results - (( _ application ((need algorithm) OR (tree algorithm)) ) OR ( some application rsa algorithm ))

Refine Results
  1. 1

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4

    Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency by Ramli, Muhammad Shahrul Azwan, Zainal Abidin, Mohamad Shukri, Hasan, Nor Shahida, Md Reba, Mohd Nadzri, Kolawole, Keshinro Kazeem, Ardiansyah, Rizqi Andry, Mpuhus, Sikudhan Lucas

    Published 2024
    “…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM by ABDUL HALIM, ABDUL HANIF

    Published 2018
    “…These components need to be balanced in order to improve the algorithm performance with smaller variance of solution under repetitive trials, faster convergence towards global optimum and thus with lesser computation cost. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Analysis and comparison of classification algorithms for credit approval in Islamic banks by Pebrianti, Dwi, Wijanarko, Whena, Bayuaji, Luhur, Toha, Siti Fauziah

    Published 2025
    “…Conversely, the C4.5 algorithm achieved a balanced performance with a testing accuracy of 74.5%, making it a promising candidate for practical application in Sharia-compliant credit risk assessment. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan Abdul Manan by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun, Othman, Mohd Azlishah, Ismail, Mohd Muzafar, Misran, Mohamad Harris, Meor Said, Maizatul Alice, Ramlee, Ridza Azri

    Published 2013
    “…In order to perform fast collision detection technique in Virtual Environment Application, researchers need to maintain the behaviour of the object itself before the objects come into contact. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Improved tree routing protocol in zigbee networks by Al-Harbawi, Mostafa Kamil Abdulhusain

    Published 2010
    “…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
    Get full text
    Get full text
    Thesis
  20. 20