Search Results - (( web application ((rsa algorithm) OR (_ algorithm)) ) OR ( its relation based algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Marine Predator Algorithm and Related Variants: A Systematic Review by Emmanuel, Philibus, Azlan, Mohd Zain, Didik Dwi, Prasetya, Mahadi, Bahari, Norfadzlan, Yusup, Rozita, Abdul Jalil, Mazlina, Abdul Majid, Azurah, A Samah

    Published 2025
    “…This paper provides a systematic review of the research progress and applications of the MPA by analyzing more than 100 articles sourced from Scopus and Web of Science databases using the PRISMA approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…This paper provides a systematic review of the research progress and applications of the MPA by analyzing more than 100 articles sourced from Scopus and Web of Science databases using the PRISMA approach. …”
    Get full text
    Get full text
    Article
  6. 6

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. …”
    Proceedings Paper
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Penggunaan penyepadanan imej berdasarkan kawasan dalam fotogrametri jarak dekat bagi pengukuran permukaan struktur by Sahdan, Ahmad Yusof

    Published 2006
    “…Images of the web part under loading were captured using off-the shelf digital cameras that are relatively fixed and calibrated. Whilst the image matching process employs a revised area-based matching algorithm, the image coordinate refinements and the three-dimensional model of the web profile was acquired through elementary photogrammetric operations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…Most recently, graphs have become prevalent data structures to model complex information networks for various real-life contemporary applications such as social networks, knowledge bases, pattern recognition, and the World Wide Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…The final product is a web-based system, AMLGuard, which incorporates a machine learning model to detect suspicious transactions related to money laundering. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Smart energy meter based on a long-range wide-area network for a stand-alone photovoltaic system by Jabbar, Waheb A., Annathurai, Sanmathy, Tajul Ariffin, A. Rahim, M. Fitri, Mohd Fauzi

    Published 2022
    “…Long-range wide-area network (LoRaWAN) has emerged as a key technology for Internet of Things (IoT) applications worldwide owing to its cost-effectiveness, robustness to interference, low power, licensed-free frequency band, and long-range connectivity, thanks to the adaptive data rate. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A new algorithm to measure relevance among Web pages by Sadi, M.S., Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2006
    “…To evaluate the performance, the algorithm is compared with existing algorithms. Experimental results show that RWP outperforms existing algorithms to find relevant Web pages. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Web page recommendation system is an application of Web Usage Mining (WUM) approach, which specializes in predicting the user next browsing activity in real-time Web for personalized recommendations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan by Wan Chik, Wan Adnan

    Published 2006
    “…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A phonetically rich and balanced lexical corpus using zipfian distribution for an under resourced language / Aminath Farshana by Aminath , Farshana

    Published 2018
    “…In recent times, speech technology and its related applications are becoming a popular topic among researchers. …”
    Get full text
    Get full text
    Get full text
    Thesis