Search Results - (( based application ((tree algorithm) OR (rsa algorithm)) ) OR ( some application _ algorithm ))
Search alternatives:
- based application »
- some application »
- tree algorithm »
- rsa algorithm »
-
1
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
2
-
3
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
4
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
5
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
6
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
13
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
14
-
15
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
17
Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob
Published 2006“…Therefore, the Minimax algorithm is not applicable. The players are human and a goal-based agent. …”
Get full text
Get full text
Thesis -
18
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
19
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
20
