Search Results - (( web applications rsa algorithm ) OR ( phone application learning algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. An application called ‘AndroSensor’ on a smartphone, that retrieves real-time data from accelerometer, gyroscope and gravity sensors, is used as the input signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Nabil Ali Al-Emad, Nabil Ali Al-Emad, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusof, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Durian Farm Threats Identification through Convolution Neural Networks and Multimedia Mobile Development by Yusoff, Aiman, Kamarudin, Noraziahtulhidayu, Al-Emad, Nabil Ali, Sapuan, Khusairi

    Published 2023
    “…The application implements a deep learning algorithm of Convolutional Neural Network (CNN)-YOLO3in order to receive the best output results in identifying the different datasets of durian farm threats. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20