Search Results - (( wave application ((among algorithm) OR (acs algorithm)) ) OR ( web application rsa algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Cardiac abnormality prediction using tansig based multilayer perceptron by Mohanty, Sibani Priyadarshini, Syahrull Hi-Fi Syam Ahmad Jamil, Jailani Abdul Kadir, Mohd Salman Mohd Sabri, Fakroul Ridzuan Hashim

    Published 2021
    “…This reference parameter is better known as the input parameter to the ANN to detect cardiac abnormalities, among which are the of the height of peak/wave (amplitude) and time occurrence of peak/wave (duration of time) extracted from the electrocardiogram (ECG) signal. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20