Search Results - (( web application towards algorithm ) OR ( web application ((use algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…Increasing use of mobile phones to access web applications increases the threat of cross-site scripting attacks on mobile phones. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study by Mohd Nurhafeezi, Nordin

    Published 2013
    “…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…With this web application, students can make more informed decisions and take a step towards achieving their academic goals. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Adopting Jaya Algorithm for Team Formation Problem by Kader, Md. Abdul, Kamal Z., Zamli

    Published 2020
    “…This paper presents a simple and mighty metaheuristic algorithm, Jaya, which is applied to solve the team formation (TF) problem and it is a very fundamental problem in many databases and expert collaboration networks or web applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…This paper provides a systematic review of the research progress and applications of the MPA by analyzing more than 100 articles sourced from Scopus and Web of Science databases using the PRISMA approach. …”
    Get full text
    Get full text
    Article
  11. 11

    Marine Predator Algorithm and Related Variants: A Systematic Review by Emmanuel, Philibus, Azlan, Mohd Zain, Didik Dwi, Prasetya, Mahadi, Bahari, Norfadzlan, Yusup, Rozita, Abdul Jalil, Mazlina, Abdul Majid, Azurah, A Samah

    Published 2025
    “…This paper provides a systematic review of the research progress and applications of the MPA by analyzing more than 100 articles sourced from Scopus and Web of Science databases using the PRISMA approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Online zakat application system for UiTM Tapah using fuzzy logic / Maizatul Asyikin Mokhtar by Maizatul Asyikin, Mokhtar

    Published 2016
    “…This research is about the application of fuzzy logic algorithm in applying zakat. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
    Get full text
    Thesis
  18. 18
  19. 19

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  20. 20

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…In recent years, however, advent of computer vision (CV) algorithms make it possible to reconstruct 3D geometry of objects by using image sequences from digital cameras, which are then processed by web services and freeware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article