Search Results - (( ais implementation based algorithm ) OR ( program implementation rsa algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of Artificial Intelligence In Smart City by Law, Jia Wei

    Published 2021
    “…This study aims to study the effects of the implementation of AI in the smart city. The objectives of this study are to review the concepts of AI and smart city, conduct the Strength, Weakness, Opportunity, and Threat (SWOT) Analysis of deployment of AI in a smart city, and propose the future trends of AI implementation in a smart city. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Facilitating English Language teaching through AI- based drama in Palestine by Bsharat, Tahani, Sheikh Ahmad, Ismail

    Published 2025
    “…The survey sought to capture their perspectives on AI, AI- based drama techniques, the impact of AI in EFL classrooms, and the challenges associated with its implementation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman by Seman, Noraini

    Published 2012
    “…A variety of automatic knowledge acquisition or learning and adaptation concepts need to be established in speech recognition using AI approaches. These key concepts can only be implemented using artificial neural networks (ANNs) approach. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Anomaly detection for vision-based inspection by Chew, Yan Zhe

    Published 2022
    “…The usage of Artificial Intelligence (AI) techniques in vision-based anomaly detection is gaining traction within the manufacturing industry for quality inspection purposes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20