Search Results - (( its applications out algorithm ) OR ( web application ((rsa algorithm) OR (cell algorithm)) ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang by Bernard Lee, Kok Bang

    Published 2019
    “…The first tool – GENIPAC (Genomic Information Portal on Cancer Cell Lines), is a web resource for exploring, visualising, and analysing genomics information from 44 head and neck cancer cell lines. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…In neurosurgical, Magnetic Resonance Images (MRI) scans are used to detect cancerous cell grow thin brain called brain tumor. Application that can aid in providing automatic brain tumor segmentation is crucial as segmentation of the exact size and spatial location of these tumors are a time-consuming task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12

    Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database by Zainol Abidin, Husna, M. Yassin, Ihsan, Abdul Rahman, Farah Yasmin

    Published 2011
    “…This data must also be easily accessible to all users that require them. The emergence of Web-Driven Database Applications (WDDA) has helped fulfil this requirement. …”
    Get full text
    Get full text
    Research Reports
  13. 13

    Parallel matrix-multiplication algorithm on network of workstations by Md. Aminuddin, Rusdi, Abdullah, Rosni, Hassan, Suhaidi

    Published 2004
    “…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Optimal power flow using the Jaya algorithm by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20