Search Results - (( web application ((rsa algorithm) OR (max algorithm)) ) OR ( its application based algorithm ))*
Search alternatives:
- application based »
- web application »
- its application »
- rsa algorithm »
- max algorithm »
-
1
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud
Published 2022“…The binary image of the extracted characters was fed to the CNN model for classification. In addition, a simple web application connected to Jupyter Notebook has been developed to perform the testing. …”
Get full text
Get full text
Student Project -
5
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
6
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. HS is a well-known human-based meta-heuristic algorithm that mimics the process of creating a new harmony in music. …”
Get full text
Get full text
Get full text
Article -
7
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
Get full text
Get full text
Article -
10
Recent Advances and Applications of Spiral Dynamics Optimization Algorithm: A Review
Published 2022“…The growth of the SDO algorithm and its application in various areas, theoretical analysis, and comparison with its preceding and other algorithms are also described in detail. …”
Get full text
Get full text
Article -
11
-
12
-
13
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
14
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
-
17
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…However, the HKA algorithm has its own flaws. Although it was introduced as a population-based stochastic optimization algorithm, HKA is not exactly a population-based algorithm because it initializes and updates only a single solution. …”
Get full text
Get full text
Thesis -
18
-
19
Fuzzy Logic Based Self-Adaptive Handover Algorithm for MobileWiMAX.
Published 2013“…In this paper, a fuzzy logic based self-adaptive handover (FuzSAHO) algorithm is introduced. …”
Get full text
Get full text
Article -
20
