Search Results - (( its application tools algorithm ) OR ( _ application ((rsa algorithm) OR (tree algorithm)) ))*
Search alternatives:
- application tools »
- tools algorithm »
- tree algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. The objective is to provide a reliable tool for students, laptop buyers, and sellers to estimate laptop prices accurately. …”
Get full text
Get full text
Thesis -
4
-
5
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan Abdul Manan
Published 2023“…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Get full text
Article -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
A matrix approach for minimum spanning tree in neutrosophic and application in medical waste management / Nur Haifa Ahmad Hayazim, Siti Nurain Zulkifli and Siti Nurhidayah Yaacob
Published 2022“…Many research works have been done to find an MST due to its various applications. In real-life problems, there are a variety of uncertainties that make determining the exact length of the arc extremely difficult. …”
Get full text
Get full text
Student Project -
8
-
9
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
10
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…This study systematically examined recent research trends in multi-objective optimization (MOO) for building performance from 2020 to 2024 and proposed a conceptual framework integrating intelligent algorithms, simulation tools, and climate adaptation strategies. …”
Get full text
Get full text
Get full text
Article -
11
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
14
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
16
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
17
Integrated reconstruction of 2D overlapping coronary artery from x-ray angiography with 3D virtual myocardial model using non-rigid iterative closest point algorithm
Published 2019“…In the reconstructed coronary artery tree. Its peculiar advantage lies in the 3D reconstruction of the coronary artery tree from X-ray angiographic images without the need for corresponding points between vessels in each view. …”
Get full text
Get full text
Thesis -
18
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
19
Text Summarization System with Bayesian Theorem on Oil & Gas Drilling Topic
Published 2007“…There exist numerous algorithms to address the need for text summarization including Support Vector Machine, k-nearest neighbor classifier, and decision trees. …”
Get full text
Get full text
Final Year Project -
20
