Search Results - (( based evaluation using algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- based evaluation »
- evaluation using »
- java application »
- using algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…The objectives this research are to investigate hybrid algorithm in game generator, to develop Sudoku generator based on hybrid algorithm and lastly to test and evaluate the Sudoku generator using time comparison. …”
Get full text
Get full text
Thesis -
7
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
Get full text
Get full text
Get full text
Article -
8
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…However, the complexity of the kmedoid based algorithms in general is more than the complexity of the k-means based algorithms. …”
Get full text
Get full text
Thesis -
9
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…The VEGSA algorithms use a number of populations of particles. …”
Get full text
Get full text
Get full text
Article -
11
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…For subjective evaluation, listening tests were evaluated using the Mean Opinion Score (MOS) technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Case Slicing Technique for Feature Selection
Published 2004“…The maximum and minimum accuracy obtained is 99% and 96% respectively, based on the evaluation approach. The most commonly used evaluation technique is called k-cross validation technique. …”
Get full text
Get full text
Thesis -
13
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
14
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
15
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
16
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
Get full text
Get full text
Get full text
Thesis -
17
An adaptive routing algorithm: enhanced confidence-based Q routing algorithm in network traffic
Published 2004“…Confidence-based Q (CQ) Routing Algorithm is an adaptive network routing algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
19
Educational video recommender system for computer science students using content-based filtering / Walid Burhani Mohd Zamani
Published 2025“…The objective is to study the content-based algorithm, to develop the prototype of educational video recommendation system using content-based filtering algorithm and to evaluate the performance and accuracy of the content-based filtering algorithm. …”
Get full text
Get full text
Thesis -
20
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article
