Search Results - (( web application rsa algorithm ) OR ( loss implications _ algorithm ))*

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Rotor losses in fault-tolerant permanent magnet synchronous machines by Raminosoa, Tsarafidy, Gerada, Christopher, Othman, Md Nazri, De Lillo, Liliana

    Published 2011
    “…There are numerous published literatures on the design of FT machines as well as on control algorithms used to maintain drive operation with an incurred fault. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…However, Adamax optimization algorithm showed the best results when employed to train the DANN model. …”
    Get full text
    Get full text
    Article
  6. 6

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
    Get full text
    Get full text
    Article
  7. 7

    Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array by Ching, H.C., Naidu, R., Seong, M.K., Har, Y.C., Taib, N.A.

    Published 2011
    “…In this study, we aimed to explicate the underlying chromosomal copy number (CN) alterations and loss of heterozygosity (LOH) implicated in a cohort of Malaysian hospital-based primary breast carcinoma samples using a single nucleotide polymorphism (SNP) array platform. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Cyber hygiene during Covid-19 to avoid cyber attacks by Lee, Yvonne Yi Jin

    Published 2022
    “…In addition, we need to practice the best cyber hygiene behaviors in order to avoid cyber-attacks like phishing, data loss, and others. Therefore, we need a deeper understanding of how the various variables have an impact on cyber hygiene behaviour. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    The predictive machine learning model of a hydrated inverse vulcanized copolymer for effective mercury sequestration from wastewater by Ghumman, A.S.M., Shamsuddin, R., Abbasi, A., Ahmad, M., Yoshida, Y., Sami, A., Almohamadi, H.

    Published 2024
    “…A predictive machine learning model was also developed to predict the amount of mercury removed () using GPR, ANN, Decision Tree, and SVM algorithms. Hyperparameter and loss function optimization was also carried out to reduce the prediction error. …”
    Get full text
    Get full text
    Article
  13. 13

    The influence of Robo-advisory services on Malaysia university student’s investment intention by Tan, Yung Hui, Lim, Jia Eng, Lim, Keh Xin, Zeng, Yi

    Published 2025
    “…The emergence of robo-advisory services has transformed the landscape of investment by offering automated, algorithm-driven financial planning with minimal human intervention. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…This model will also be cost effective and data loss will be controlled using two different ways.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item