Search Results - (( its application during algorithm ) OR ( web application ((rsa algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of web-based GIS for traffic management system with obstacle avoidance technique using open source software by Nik Yusoff, Nik Mohd Ramli

    Published 2014
    “…In order to calculate the shortest path between two nodes, Dijkstra algorithm was utilized. Obstacle avoidance technique was implemented in this algorithm to avoid the congested areas. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification by Mutholib, Abdul, Abdul Rahim, Nadirah, Gunawan, Teddy Surya

    Published 2025
    “…A detailed literature review highlights the current state of satellite anomaly identification and the application of the Web AI-based DSS in various fields. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…The project is mainly a web application for the purpose of online voting. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17
  18. 18
  19. 19

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20