Search Results - (( its applications out algorithm ) OR ( web application ((rsa algorithm) OR (cell algorithm)) ))*
Search alternatives:
- its applications »
- applications out »
- web application »
- cell algorithm »
- out algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Image Segmentation Using an Adaptive Clustering Technique for the Detection of Acute Leukemia Blood Cells Images
Published 2024Proceedings Paper -
7
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…The first tool – GENIPAC (Genomic Information Portal on Cancer Cell Lines), is a web resource for exploring, visualising, and analysing genomics information from 44 head and neck cancer cell lines. …”
Get full text
Get full text
Thesis -
8
Review on the Recent Developments of Photovoltaic Thermal (PV/T) and Proton Exchange Membrane Fuel Cell (PEMFC) Based Hybrid System
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Brain tumor image segmentation using deep learning approach
Published 2022“…In neurosurgical, Magnetic Resonance Images (MRI) scans are used to detect cancerous cell grow thin brain called brain tumor. Application that can aid in providing automatic brain tumor segmentation is crucial as segmentation of the exact size and spatial location of these tumors are a time-consuming task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database
Published 2011“…This data must also be easily accessible to all users that require them. The emergence of Web-Driven Database Applications (WDDA) has helped fulfil this requirement. …”
Get full text
Get full text
Research Reports -
13
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
17
-
18
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
19
-
20
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper
