Search Results - (( _ applications rsa algorithm ) OR ( its application ((tree algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. The objective is to provide a reliable tool for students, laptop buyers, and sellers to estimate laptop prices accurately. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
    Get full text
    Get full text
    Research Reports
  6. 6

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  7. 7

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…The study has specifically developed four main objectives to achieve its aim, namely: (1) to identify camera internal geometry of UAV for DTM production under tree canopy conditions, (2) to identify appropriate methods for the tree height estimation based on tree crown delineation, (3) To formulate a new methodology for estimating DTM production under tree canopy conditions - (Under Oil Palm area), and (4) to validate the accuracy of DTM result based on in situ measurement. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image by Zainal Azali, Muhammad Nazmi

    Published 2024
    “…This thesis presents a local-based stereo matching algorithm to increase the accuracy on complex regions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy by Rahman, Sam Matiur, Ali, Md. Asraf, Altwijri, Omar, Alqahtani, Mahdi, Ahmed, Nasim, Ahamed, Nizam Uddin

    Published 2020
    “…Therefore, we aimed to classify six classes of freshly excised tissues from a set of electrical impedance measurement variables using five ensemble-based machine learning (ML) algorithms, namely, the random forest (RF), extremely randomized trees (ERT), decision tree (DT), gradient boosting tree (GBT) and AdaBoost (Adaptive Boosting) (ADB) algorithms, which can be subcategorized as bagging and boosting methods. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram by Faris Francis Singaram, Fareena

    Published 2021
    “…The supervised machine learning algorithm, SVM and Decision Tree are used for the estimation of the mangrove age into young and mature. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20