Search Results - (( certification implementation encryption algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- implementation encryption »
- java implementation »
- implementation tree »
- tree algorithm »
- certification »
-
1
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
2
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
3
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
4
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
7
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
8
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…The proposed Multi-Authority Attribute-Based Encryption with Cache-Aware Scheduling for Mobile Cloud Access Control in Mobile Cloud Computing environment analysis of the theoretical and implemented results demonstrated that the scheme performed better compared to the previous work solution in terms of availability and integrity. …”
Get full text
Get full text
Thesis
