Search Results - (( its relationship between algorithm ) OR ( web application rsa algorithm ))
Search alternatives:
- between algorithm »
- its relationship »
- web application »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
-
5
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…Its can build all types of relationship that exist between words. …”
Get full text
Get full text
Thesis -
6
Behavioural influence of TikTok’s algorithm recommendations on users’ engagement and users’ self-persuasion / Siti Khadijah Amir Hamzah, Ahlam Abdul Aziz and Shazleen Mohamed
Published 2025“…The research aims to achieve the following objectives: (1) identify the level of behavioural influence exerted by TikTok's algorithm on users, (2) examine the level of users' engagement in response to TikTok algorithm recommendations among users, (3) identify level of users' self-persuasion influenced by the algorithm, (4) identify the relationship between behavioural influence and users' engagement, and (5) identify the relationship between behavioural influence and users' self-persuasion. …”
Get full text
Get full text
Get full text
Article -
7
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…The optimized GEP as a recent extension of GEP approach is superior to other AI-based methods in giving an optimized explicit equation, which clearly shows the relationship between input historical data and EEC in different countries without prior knowledge about the nature of the relationships between independent and dependent variables. …”
Get full text
Get full text
Get full text
Thesis -
8
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
Get full text
Get full text
Article -
9
Modified ACS centroid memory for data clustering
Published 2019“…The problem arises because ACOC is a centroid-label clustering algorithm, in which the relationship between a centroid and instance is unstable. …”
Get full text
Get full text
Get full text
Article -
10
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The findings of this research aim to offer valuable insights into the relationship between laptop specifications and their corresponding prices, helpingusers make informed decisions in the laptop market. …”
Get full text
Get full text
Thesis -
11
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
12
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…Multilayer Perceptron neural networks (MLP) are mathematicaVcomputational models inspired by imitating the biological central nervous system and its neurons. MLPs gained an immense attention due to its simplicity, good generalization and its ability to capture complex relationships between variables via a series of input-output measurements. …”
Get full text
Get full text
Thesis -
13
An improved electromagnetism-like mechanism algorithm for the optimization of maximum power point tracking / Tan Jian Ding
Published 2017“…The first phase of the research was on the investigation of the relationship between the search step size and the convergence performance. …”
Get full text
Get full text
Get full text
Thesis -
14
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Article -
15
Pixel-based skin color detection technique
Published 2005“…To estimate the skin locus boundary, a skin classifier box is created by integration of the proposed three heuristic rules based on how often each RGB pixel-relationship falls into its interval.…”
Get full text
Get full text
Get full text
Article -
16
Predictive Analytics of the Likelihood Of Road Accidents by Location
Published 2019“…The solution that will be introduce by this project is a dashboard containing visuals of relationship between different factors to road accident. …”
Get full text
Get full text
Final Year Project -
17
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…—The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Adaptive Spiral Dynamics Metaheuristic Algorithm for Global Optimisation with Application to Modelling of a Flexible System
Published 2016“…This paper presents a nature-inspired metaheuristic algorithm namely linear adaptive spiral dynamics algorithm (LASDA) and its application to modelling of a flexible system. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Novel Adaptive Spiral Dynamics Algorithms for Global Optimization
Published 2012“…SDA is known as fast computing algorithm due to its simplicity in the structure and it has stable convergence response when approaching the optimum point in the search space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…The results showed that CTI-AR effectively identify the attributes, relationship between attributes and attribution level group of cyberattack in CTI. …”
Get full text
Get full text
Get full text
Get full text
Thesis
