Search Results - (( based information method algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An adaptive density-based method for clustering evolving data streams / Amineh Amini by Amini, Amineh

    Published 2014
    “…Density-based method has emerged as a worthwhile class for clustering data streams. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan by Mohd Ridzuan, Siti Amnah

    Published 2017
    “…Both algorithm been illustrated in textbook selection. The proposed methods can be utilized as another option to solve a decision making problem.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Overall, the proposed method offers a novel and effective solution to the information overload challenge in the tourism industry.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi... by Mohd Ghazi, Mohd Razif

    Published 1999
    “…These are the Wagner & Fischer and Hirschberg algorithms. These methods were chosen because they are based on dynamic programming. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar by Mokhtar, Mohd Rosmadi

    Published 2001
    “…It is known as conflation methods. One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Thus, this thesis has developed and evaluated a filter based Information Theoretic-based Feature Selection (IFS) for machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA) by Hasni, Hassan, Aznida Hayati, Zakaria@Mohamad, Mohd Isa, Awang, Mokhairi, Makhtar, Rohana, Ismail, Fadhilah, Ahmad

    Published 2017
    “…However, the focus of the paper is on a method proposed to extract adjacency matrix from concepts obtained from the theory of Formal Concept Analysis (FCA) using two consecutive algorithms called the Relatedness Algorithm and Adjacency Matrix Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Application of induced preorderings in score function-based method for solving decision-making with interval-valued fuzzy soft information by Ali, Mabruka, Kilicman, Adem, Khameneh, Azadeh Zahedi

    Published 2021
    “…Currently, there are three interval-valued fuzzy soft set-based decision-making algorithms in the literature. …”
    Get full text
    Get full text
    Article
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
    Get full text
    Get full text
    Thesis