Search Results - (( data continuation patterns algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…Experiments for testing the recognition rates involves the twenty-six trained sample data with perfect pattern and untrained sample data with 10% corrupted pattern. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Advanced flood prediction at forest with rainfall data using various machine learning algorithms by M.S., Saravanan, S., Sivashankar, A., Rajesh, Mat Ibrahim, Masrullizam

    Published 2024
    “…The aim is to classify and predict floods in advance with rain data patterns of India using spatio-temporal logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…The data will then be separated into training set and testing set and will be feed to the machine learning algorithm to find the pattern and try to do prediction. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Pemahaman guru matematik Tahun Enam tentang pembahagian nombor bulat / Hoi Sim Min by Hoi , Sim Min

    Published 2018
    “…This study also found that teachers have four general patterns of thought and an algorithm to solve the problem of division of whole numbers, that is, the general pattern of thought of partition, measurement, repeated subtraction, the inverse of multiplication , and long division algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Article
  13. 13

    Using Pattern Search Methods for Minimizing Clustering Problems by Shabanzadeh, Parvaneh, Abu Hassan, Malik, Leong, Wah June, Mohagheghtabar, Maryam

    Published 2010
    “…Clustering is one of an interesting data mining topics that can be applied in many fields. …”
    Get full text
    Article
  14. 14

    Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim

    Published 2020
    “…As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Machining surface roughness monitoring using acoustic emission method by Mohd Syazlan, Mohd Hatta

    Published 2010
    “…Based on experiment data, the pattern of AE parameter with Fast Fourier Transform, FFT can be concluded. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…Looking ahead, future works may explore refining the SVM model and incorporating additional features for improved accuracy, and the ongoing iterative process involves continuous validation and adaptation of the model to evolving data patterns and emerging challenges in pandemic management. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…However, the current DBN.NIDS model is still ineffective for large-scale real-world data due to some issues: 1) the pre-training of the DBN algorithm includes simple feature learning which does not work very well to extract important features from the attack data, 2) the classification task of the DBN algorithm is a poor detection for imbalanced class dataset and 3) the design of the DBN model could be weak and need to be continuously updated by modern definitions of abnormal to detect recent attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20