Search Results - (( its application ((rsa algorithm) OR (tree algorithm)) ) OR ( its application among algorithm ))
Search alternatives:
- application among »
- its application »
- among algorithm »
- tree algorithm »
- rsa algorithm »
-
1
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
2
Application of Decision Trees in Athlete Selection: A Cart Algorithm Approach
Published 2023“…This study investigates the application of Decision Trees (DTs), a non-parametric supervised learning method, renowned for its simplicity, interpretability, and wide applicability in various domains, including machine learning for classification and regression tasks. …”
Get full text
Get full text
Get full text
Article -
3
Predicting factor of online purchasing behaviour among university students in UiTMCT / Mohd Fadzlee Mazlan
Published 2022“…Several prediction rules already been produced with high interestingness by using K-Mean clustering algorithm and Random Tree algorithm. The final result was represented in dashboard. …”
Get full text
Get full text
Student Project -
4
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
7
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
-
12
-
13
Application of machine learning algorithms to predict removal efficiency in treating produced water via gas hydrate-based desalination
Published 2025“…Among these, the SVM model showed the best predictive accuracy, R2 of 0.98, with the lowest AIC (56.75), RMSE (1.50), and MAE (1.22) values, highlighting its robustness in capturing the intricate dependencies between operational parameters and removal performance. …”
Get full text
Get full text
Article -
14
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…Its practical value is demonstrated through applications in residential, educational, and commercial buildings across various climate zones. …”
Get full text
Get full text
Get full text
Article -
15
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
16
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
17
-
18
-
19
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The total number of existing oil palm trees and the number of missing trees together with its individual coordinates can be obtained using this graphical interface.…”
Get full text
Get full text
Thesis -
20
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis
