Search Results - seen ((rsa algorithm) OR (graph algorithm))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…The PKI is used to secure the exam question file during the preparation of exam question at Universiti Teknologi MARA, Jasin, Melaka. This system will used RSA and SHA-256 to produce digital signature because both of the algorithm consist more advantages than other algorithm which is suitable to used to protect document in current insecure network. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Examination timetabling for undergraduate programme using graph coloring approach / Norarida Abd Rhani ... [et al.] by Abd Rhani, Norarida, Mat Saad, Nor Najihah, Zulkfeli, Nabilah, Mazlan, Mardhiyah Marisha, Mahmud, Maziah, Mohamad, Siti Nurul Fitriah, Wan Yusoff, Wan Roslini

    Published 2021
    “…Any clashes of timetabling that arise can be detected and remedied immediately. An algorithm based on Graph coloring technique is one of the feasible solutions that can address these issues of managing timetables. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    Extrema Points Application In Determining Iris Region Of Interest by Othman, Zuraini, Kasmin, Fauziah, Syed Ahmad, Sharifah Sakinah, Abdullah, Azizi

    Published 2019
    “…The valid ROI was found from the probabilities graph of the SVM obtained by looking at the global minimum conditions determined by a second derivative model in a graph of functions. …”
    Get full text
    Get full text
    Get full text
    Article