Search Results - (( _ application ((need algorithm) OR (tree algorithm)) ) OR ( some application rsa algorithm ))
Search alternatives:
- some application »
- application rsa »
- need algorithm »
- tree algorithm »
- rsa algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
2
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency
Published 2024“…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
Get full text
Get full text
Get full text
Article -
5
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
6
-
7
A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM
Published 2018“…These components need to be balanced in order to improve the algorithm performance with smaller variance of solution under repetitive trials, faster convergence towards global optimum and thus with lesser computation cost. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Analysis and comparison of classification algorithms for credit approval in Islamic banks
Published 2025“…Conversely, the C4.5 algorithm achieved a balanced performance with a testing accuracy of 74.5%, making it a promising candidate for practical application in Sharia-compliant credit risk assessment. …”
Get full text
Get full text
Get full text
Article -
11
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
12
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan Abdul Manan
Published 2023“…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Get full text
Article -
13
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
14
-
15
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…In order to perform fast collision detection technique in Virtual Environment Application, researchers need to maintain the behaviour of the object itself before the objects come into contact. …”
Get full text
Get full text
Article -
16
Nano-scale VLSI clock routing module based on useful-skew tree algorithm
Published 2006Get full text
Get full text
Article -
17
Window based personalized time management system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
18
-
19
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
20
