Search Results - (( its applications based algorithm ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1
  2. 2

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Comprehensive review of the development of the harmony search algorithm and its applications by Al-Omoush, A.A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Kamal Z., Zamli

    Published 2019
    “…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
    Get full text
    Get full text
    Article
  9. 9

    Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review by Omar, M.B., Bingi, K., Rajanarayan Prusty, B., Ibrahim, R.

    Published 2022
    “…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    A modified generalized RBF model with EM-based learning algorithm for medical applications by Ma, Li Ya, Abdul Rahman, Abdul Wahab, Quek, Chai

    Published 2006
    “…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…However, the HKA algorithm has its own flaws. Although it was introduced as a population-based stochastic optimization algorithm, HKA is not exactly a population-based algorithm because it initializes and updates only a single solution. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX. by Mohd Ali, Borhanuddin, Ismail, Alyani, Noordin, Nor Kamariah, Ben-Mubarak, Mohammed A., Ng , Ben Chee Kyun

    Published 2013
    “…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
    Get full text
    Get full text
    Article
  20. 20

    Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat by Mohammad Ahmad, Jomah Tubishat

    Published 2019
    “…Aspect extraction is considered as the core task in aspect-based sentiment analysis and other applications. …”
    Get full text
    Get full text
    Get full text
    Thesis