Search Results - (( its application out algorithm ) OR ( its applications ((rsa algorithm) OR (tree algorithm)) ))*

Refine Results
  1. 1

    Partial key attack given MSBs of CRT-RSA private keys by Abd Ghafar, Amir Hamzah Abd, Kamel Ariffin, Muhammad Rezal Kamel, Md Yasin, Sharifah Md, Sapar, Siti Hasana

    Published 2020
    “…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
    Get full text
    Get full text
    Article
  2. 2

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob by Ahmad Hayazim, Nur Haifa, Zulkifli, Siti Nurain, Yaacob, Siti Nurhidayah

    Published 2022
    “…Many research works have been done to find an MST due to its various applications. In real-life problems, there are a variety of uncertainties that make determining the exact length of the arc extremely difficult. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…There exist numerous algorithms to address the need of text categorization including Naive Bayes, k-nearest-neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Text Summarization System with Bayesian Theorem on Oil & Gas Drilling Topic by Kurniawan, Iwan

    Published 2007
    “…There exist numerous algorithms to address the need for text summarization including Support Vector Machine, k-nearest neighbor classifier, and decision trees. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    On (unknowingly) using near-square RSA primes by Ruzai, Wan Nur Aqlili, Abd Ghafar, Amir Hamzah, Salim, Nur Raidah, Kamel Ariffin, Muhammad Rezal

    Published 2022
    “…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
    Get full text
    Get full text
    Article
  16. 16

    A comprehensive review of crop yield prediction using machine learning approaches with special emphasis on palm oil yield prediction by Rashid, Mamunur, Bari, Bifta Sama, Yusri, Yusup, Mohamad Anuar, Kamaruddin, Khan, Nuzhat

    Published 2021
    “…Since one of the major objectives of this study is to explore the future perspectives of machine learning-based palm oil yield prediction, the areas including application of remote sensing, plant’s growth and disease recognition, mapping and tree counting, optimum features and algorithms have been broadly discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20