Search Results - (( basic computer support algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman by Abdul Rahman, Nur Amiera

    Published 2014
    “…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri by Muhamad Shukri, Muhamad Nur Adhwa

    Published 2017
    “…The idea present in applicationbased regarding how computer game can effect player emotion to support other methodology in marketing sales known as “Emotion Level” to solve the problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The agent-based model for CPS has been developed in JADE environment which applied the basic Believe, Desire and Intention (BDI) architecture to support multi-agent system environment. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    DSC766: Text Analytics / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2020
    “…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  15. 15

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review by Mat Ripah N.A., Abdul Latif A., Che Cob Z., Mohd Drus S., Md Anwar R., Mohd Radzi H.

    Published 2024
    “…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
    Conference Paper
  20. 20

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
    Get full text
    Get full text
    Article