Search Results - (( _ application among algorithm ) OR ( its application ((rsa algorithm) OR (tree algorithm)) ))*
Search alternatives:
- application among »
- among algorithm »
- tree algorithm »
- rsa algorithm »
-
1
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Application of Decision Trees in Athlete Selection: A Cart Algorithm Approach
Published 2023“…This study investigates the application of Decision Trees (DTs), a non-parametric supervised learning method, renowned for its simplicity, interpretability, and wide applicability in various domains, including machine learning for classification and regression tasks. …”
Get full text
Get full text
Get full text
Article -
4
Predicting factor of online purchasing behaviour among university students in UiTMCT / Mohd Fadzlee Mazlan
Published 2022“…Several prediction rules already been produced with high interestingness by using K-Mean clustering algorithm and Random Tree algorithm. The final result was represented in dashboard. …”
Get full text
Get full text
Student Project -
5
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
-
9
-
10
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
11
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
12
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
13
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
14
Application of machine learning algorithms to predict removal efficiency in treating produced water via gas hydrate-based desalination
Published 2025“…In this context. ML algorithms provide powerful data driven means to model complex relationship within experimental datasets to improve process optimisation This study systematically evaluated several supervised ML models, including Random Forest (RF) Support Vector Machines (SVM), Ridge Regression, Lasso Regression, Decision Tree, Extra Tree Regression, Gradient Boost, and XGBoost, to predict removal efficiency in GHBD system. …”
Get full text
Get full text
Article -
15
-
16
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…Its practical value is demonstrated through applications in residential, educational, and commercial buildings across various climate zones. …”
Get full text
Get full text
Get full text
Article -
17
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
18
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
19
-
20
