Search Results - (( its application ((acs algorithm) OR (means algorithm)) ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Facial image retrieval on semantic features using adaptive mean genetic algorithm by Shnan, Marwan Ali, Rassem, Taha H., Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices by Saadeldin, Abuelgasim, Rashid, Muhammad Mahbubur, Shafie, Amir Akramin, Hasan, Tahsin Fuad

    Published 2024
    “…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). One promising application of computer vision techniques in ITS is in the development of low- computing and accurate vehicle counting systems that can be used to eliminate dependence on external cloud computing resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Precipitation trend analysis for The Langat River Basin, Selangor, Malaysia by Palizdan, Narges

    Published 2014
    “…In order to identify the homogeneous regions respectively for the annual and seasonal scales, firstly, at- site mean total annual and separately at site mean total seasonal precipitation were spatialized into 5 km × 5 km grids using the inverse distance weighting (IDW) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20