Search Results - (( from education based algorithm ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A study of feature selection algorithms for predicting students academic performance by Zaffar, M., Savita, K.S., Hashmani, M.A., Rizvi, S.S.H.

    Published 2018
    “…In EDM, Feature Selection (FS) plays a vital role in improving the quality of prediction models for educational datasets. FS algorithms eliminate unrelated data from the educational repositories and hence increase the performance of classifier accuracy used in different EDM practices to support decision making for educational settings. …”
    Get full text
    Get full text
    Article
  6. 6

    A study of feature selection algorithms for predicting students academic performance by Zaffar, M., Savita, K.S., Hashmani, M.A., Rizvi, S.S.H.

    Published 2018
    “…In EDM, Feature Selection (FS) plays a vital role in improving the quality of prediction models for educational datasets. FS algorithms eliminate unrelated data from the educational repositories and hence increase the performance of classifier accuracy used in different EDM practices to support decision making for educational settings. …”
    Get full text
    Get full text
    Article
  7. 7

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Analyzing enrolment patterns: modified stacked ensemble statistical learning based approach to educational decision-making by Zun, Liang Chuan, Nursultan Japashov, Soon, Kien Yuan, Tan, Wei Qing, Noriszura Ismail

    Published 2024
    “…Moreover, the introduction of the novel modified stacked ensemble statistical learning-based algorithm had improved predictive accuracy compared to traditional dichotomous logistic regression algorithms on average, particularly at optimal training-to-test ratios of 70:30, 80:20, and 90:10. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Analyzing enrolment patterns: Modified stacked ensemble statistical learning-based approach to educational decision-making by Chuan, Zun Liang, Japashov, Nursultan, Yuan, Soon Kien, Tan, Wei Qing, Noriszura, Ismail

    Published 2024
    “…Moreover, the introduction of the novel modified stacked ensemble statistical learning-based algorithm had improved predictive accuracy compared to traditional dichotomous logistic regression algorithms on average, particularly at optimal training-to-test ratios of 70:30, 80:20, and 90:10. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Therefore, a Dynamic Connectivity Factor Probabilistic (DCFP) is proposed, based on a novel formula that dynamically adjusts the dropping decision based on the neighbor information gathered from the node itself. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Analyzing enrolment patterns: Stacked ensemble statistical learning-based approach to educational decision making by Chuan, Zun Liang, Chong, Teak Wei, Japashov, Nursultan, Soon, Kien Yuan, Tan, Wei Qing, Noriszura, Ismail, Liong, Choong-Yeun, Tan, Ee Hiae

    Published 2023
    “…These insights were valuable for shaping educational policy and practice, emphasizing the importance of promoting STEM education initiatives and encouraging educators and counselors to empower students to pursue STEM careers while actively promoting gender equality within STEM fields.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A data mining approach to construct graduates employability model in Malaysia by Sapaat, Myzatul Akmam, Mustapha, Aida, Ahmad, Johanna, Chamili, Khadijah, Muhamad, Rahamirzam

    Published 2011
    “…To achieve it, we use data sourced from the Tracer Study, a web-based survey system from the Ministry of Higher Education, Malaysia (MOHE) for the year 2009. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20