Search Results - (( _ application ((rsa algorithm) OR (tree algorithm)) ) OR ( based application search algorithm ))
Search alternatives:
- application search »
- based application »
- tree algorithm »
- rsa algorithm »
-
1
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
2
Window based personalized time management system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
3
-
4
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
5
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…This paper presents the tuning of PID controller for single-input single-output (SISO) and multiple-input multiple-output (MIMO) control systems using tree physiology optimization (TPO). TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
Get full text
Get full text
Article -
6
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
7
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…Regarding the IME of H.264/AVC, we introduce two low cost bit-serial architectures, which are based on full search (FS) algorithm due to its regularity and coding performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Parse tree visualization for Malay sentence (BMTutor)
Published 2015Get full text
Get full text
Get full text
Article -
12
Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob
Published 2006“…Therefore, the Minimax algorithm is not applicable. The players are human and a goal-based agent. …”
Get full text
Get full text
Thesis -
13
-
14
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Furthermore, a systematic feature selection approach was proposed in which search algorithms (Ant-Search, Best First-Search and Particle Swamp Optimization (PSO) - Search) performance were evaluated to select the most significant features. …”
Get full text
Get full text
Thesis -
15
Articulated robots motion planning using foraging ant strategy
Published 2008“…Hence, a new method of configuration generation along with a novel searching style is devised. An alternative search approach using ant behaviour in a robotics application is applied. …”
Get full text
Get full text
Article -
16
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
17
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
20
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper
