Search Results - (( ((program using) OR (problem using)) content algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Building an Algorithm for Measuring C Programming Assignments Quality by Muhd Zulhafriz Aadel bin Marzuki, Muhd Zulhafriz

    Published 2008
    “…The main content of the report is the discussion of the most possible methods used to measure programming assignments quality and how it is related to this project. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    A preliminary study of difficulties in learning java programming for secondary school by Majalin, M., Aslina Baharum, Ismail, R., Ismail, I., Ervin Gubin Moung, Noor, N.A.M.

    Published 2020
    “…Coding to a specific task by using much complex algorithm is not an easy task as student needs to understand and know how to use it to solve a problem. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Problem restructuring in interger programming for reduct searching by Ungku Chulan, Ungku Azmi Iskandar

    Published 2003
    “…The thesis emphasizes mainly on the improvement of the original SIP/DRIP algorithm in term of performance. By using problem restructuring, the searching time and memory are minimized. …”
    Get full text
    Get full text
    Thesis
  13. 13

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…Therefore, this research will propose the SEDF to overcome the problem of email spoofing. The algorithm use to match the word in the searching period in the mail header is based on The Boyer-Moore. …”
    Get full text
    Get full text
    Research Reports
  14. 14
  15. 15

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…Each of these chatbots focuses on different programming concepts or constructs. These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi by Mohd Pauzi, Mohd Farhan

    Published 2022
    “…Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. A set of children images model captured and then classified into two (2) classes; children and no-children via Convolutional Neural Network (CNN) classifier. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani by Mohd Zamani, Walid Burhani

    Published 2025
    “…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis