Search Results - (( music selection method algorithm ) OR ( based information rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
    Article
  7. 7
  8. 8

    Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak by Kabulanto, Nur Fatimah, Abdul Razak, Farah Aina

    Published 2018
    “…RSA is one public key Cryptosystem to secure information and communication from third parties and it can be factor by user authentication. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Content-based feature selection for music genre classification by Muda, Noor Azilah, Choo, Yun Huoy, Norashikin, Ahmad

    Published 2022
    “…Besides the selection process, two modules of Negative Selection Algorithm; censoring and monitoring are highlighted as well in this work. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This method proves to be effective by systematically exploring and generating a variety of musical ideas through iterative applications of selection, crossover, and mutation genetic operations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Extending LSB-based partial key exposure to RSA with special-structured primes by Payne, Priscilla Kyle, Ruzai, Wan Nur Aqlili, Abd Ghafar, Amir Hamzah, Asbullah, Muhammad Asyraf, Ariffin, Muhammad Rezal Kamel

    Published 2026
    “…Previous studies have shown that RSA becomes vulnerable when its prime factors follow special algebraic structures or when partial information about their least significant bits (LSBs) is exposed. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    A hybrid approach to traditional Malay music genre classification: combining feature selection and artificial immune recognition system by Hormozi, Shahram Golzari, C. Doraisamy, Shyamala, Sulaiman, Md. Nasir, Udzir, Nur Izura

    Published 2008
    “…The new version of AIRS is used in this study. In Proposed algorithm, the resource allocation method of AIRS has been changed with a nonlinear method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Artificial immune recognition system with nonlinear resource allocation method and application to traditional Malay music genre classification by Hormozi, Shahram Golzari, C. Doraisamy, Shyamala, Sulaiman, Md. Nasir, Udzir, Nur Izura, Mohd Norowi, Noris

    Published 2008
    “…This new algorithm, AIRS with nonlinear resource allocation method, was used as a classifier in Traditional Malay Music (TMM) genre classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…LUC cryptosystem algorithm based on the quadratic and cubic polynomial, is introduced in this thesis with a new formula to distinguishing between the cubic polynomial roots. …”
    Get full text
    Get full text
    Thesis