Search Results - (( some application during algorithm ) OR ( web application rsa algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  8. 8

    Early detection of dengue disease using extreme learning machine by Suhaeri, Suhaeri, Mohd Nawi, Nazri, Fathurahman, Muhamad

    Published 2018
    “…However, back propagation neural network still suffers with some limitations such as slow convergence and easily getting stuck in local minima during training. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Hybrid HCS-fuzzy mppt algorithm for hydrokinetic energy harnessing by Wan Ismail, Ibrahim, Mohd Rusllim, Mohamed, Raja Mohd Taufika, Raja Ismail

    Published 2022
    “…The fixed stepsize Hill Climbing Search (HCS) algorithm is widely used due to its simplicity. However, the operating point oscillates around the maximum power point (MPP) during dynamic steady-state resulting waste some amount of energy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO) by Ahmed, Ehab Ali

    Published 2019
    “…These algorithms have succeeded with different accuracy levels, but it is still suffering from some weaknesses. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
    Get full text
    Get full text
    Thesis