Search Results - (( some application ((rsa algorithm) OR (new algorithm)) ) OR ( web application a algorithm ))
Search alternatives:
- some application »
- web application »
- rsa algorithm »
- new algorithm »
- application a »
- a algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Although the web tool has some limitation which it can hold back the user experience on this web tool, but there are always room for improvement.…”
Get full text
Get full text
Thesis -
4
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
5
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
6
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
7
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Fake news detection: A machine learning approach
Published 2021“…These models were evaluated in order to pick one to be deployed to the web application. The final model chosen to be deployed was a model trained using a Multinomial Naïve Bayes algorithm.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Metocean Prediction using Hadoop, Spark & R
Published 2019“…The new system will be a single page reactive web application with shiny web UI containing forecasting model, ARIMA developed with R for the variables of Metocean data stored in Hadoop and spark is integrated to make the computations happen in-memory. …”
Get full text
Get full text
Final Year Project -
12
Registration and billing system
Published 2005“…Hospital Information System (HIS) is a new term for the system that is used to manage hospital activities. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
14
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
15
Grocery Recommender System / Naajihah Mustapa
Published 2022“…To understand how the recommender system work, a preliminary study helps to understand more and choose the best algorithm to be implemented into the application. A collaborative filtering algorithm is selected. …”
Get full text
Get full text
Thesis -
16
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
Get full text
Get full text
Article -
17
-
18
Weblog search engine based on quality criteria
Published 2011Get full text
Get full text
Get full text
Article -
19
Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar
Published 2016“…This research is about the application of fuzzy logic algorithm in applying zakat. …”
Get full text
Get full text
Thesis -
20
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis
