Search Results - (( its application ((acs algorithm) OR (means algorithm)) ) OR ( web applications rsa algorithm ))*
Search alternatives:
- web applications »
- applications rsa »
- its application »
- means algorithm »
- acs algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Facial image retrieval on semantic features using adaptive mean genetic algorithm
Published 2019“…The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.…”
Get full text
Get full text
Get full text
Get full text
Article -
3
Parsing algorithms for grammars with regulated rewriting
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
5
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
6
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices
Published 2024“…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). One promising application of computer vision techniques in ITS is in the development of low- computing and accurate vehicle counting systems that can be used to eliminate dependence on external cloud computing resources. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Corrosion Inhibition Study Of Carboxymethyl Celluloseionic Liquid Via Electrochemical And Machine Learning Technique
Published 2024journal::journal article -
10
Strategies DACS3 Increasing its Performances
Published 2009Get full text
Get full text
Citation Index Journal -
11
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal -
12
-
13
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007Get full text
Get full text
Conference or Workshop Item -
14
Modified ACS centroid memory for data clustering
Published 2019Get full text
Get full text
Get full text
Article -
15
Precipitation trend analysis for The Langat River Basin, Selangor, Malaysia
Published 2014“…In order to identify the homogeneous regions respectively for the annual and seasonal scales, firstly, at- site mean total annual and separately at site mean total seasonal precipitation were spatialized into 5 km × 5 km grids using the inverse distance weighting (IDW) algorithm. …”
Get full text
Get full text
Thesis -
16
A novel approach to stuttered speech correction
Published 2016Get full text
Get full text
Get full text
Article -
17
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
