Search Results - (( its relation based algorithm ) OR ( its application ((usage algorithm) OR (rsa algorithm)) ))
Search alternatives:
- its application »
- relation based »
- rsa algorithm »
- its relation »
-
1
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
Get full text
Get full text
Get full text
Article -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
3
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Coordinate Rotation, Digital Computer (CORDIC), known as Volders Algorithm based on its inventor, is an algorithm that is applied to perform trigonometric related computations. …”
Get full text
Get full text
Student Project -
4
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…There is no determination of relative important instruction in this policy. By removing this, based on the least recent, it might cause a potential delay in the future processing if the removed instruction depends on it. …”
Get full text
Get full text
Thesis -
7
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Practical considerations on Quantum Key Distribution (QKD)
Published 2013“…In this paper, practical factors affecting realistic QKD are investigated supported by related simulation based analysis.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
10
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis -
12
Taxonomy of memory usage in swarm intelligence-based metaheuristics
Published 2019“…This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. …”
Get full text
Get full text
Get full text
Article -
13
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
14
-
15
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
Get full text
Get full text
Thesis -
16
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…The performances of MAP are evaluated through comparing its energy usage for data transmission against Low Energy Adaptive Clustering Hierarchy (LEACH) and Stable Election Protocol (SEP). …”
Get full text
Get full text
Thesis -
17
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
18
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
20
Green vehicle traffic routing system using ant-based algorithm
Published 2015“…Hence, in this paper, we present a green VTRS that reduces fuel consumption and consequently CO2 emissions via ant-based algorithm combined with fuel consumption model. …”
Get full text
Get full text
Article
