Search Results - (( data visualisation a algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Multi-dimensional Data Visualisation using Mobile Augmented Reality by Rehman Ullah, Khan, Yin, Bee Oon, Ahmad Sofian, Shminan, Lee, Jun Choi, Chen, Jacqueline How Ting

    Published 2020
    “…Therefore, this algorithm uses AR to provide a multi-display solution for improved data visualisation after processing, summarising and classifying data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Effectiveness of silhouette rendering algorithms in terrain visualisation by Che Mat, Ruzinoor, Visvalingam, Mahes

    Published 2002
    “…This approach has been implemented in a 3D modelling system to create a new method of displaying and viewing terrain data in an artistic style. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Visualisation System of COVID-19 Data in Malaysia by Rehman Ullah, Khan, NOR SYAZA, SYAMIMI, CLADIA SIMBUT, MAMBANG, IVY, THOMAS, TZI NI, WEE

    Published 2021
    “…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    3D terrain visualisation for GIS: A comparison of different techniques by Ruzinoor, Che Mat, Mohamed Shariff, Abdul Rashid, Mahmud, Ahmad Rodzi, Pradhan, Biswajeet

    Published 2011
    “…The results of this paper will be of help to the users in identifying the best technique of terrain visualisation suitable for GIS data.…”
    Get full text
    Get full text
    Book Section
  10. 10

    Visualisation System of COVID-19 Data in Malaysia by Rehman Ullah, Khan, NOR SYAZA, SYAMIMI, CLADIA SIMBUT, MAMBANG, IVY, THOMAS, NI WEE, TZI

    Published 2021
    “…This study aims to provide a system, using COVID-19 data as a sample to visualise and analyse cases, deaths, discharged ICU cases updates in Malaysia as a whole state wise of COVID-19 daily statistics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. It can be applied in data mining exploration and statistical data analysis. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER by Tay, Guo Hong

    Published 2019
    “…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. In the end, a visualisation of HFMD Disease Map is presented to visualize the city that suffer HFMD outbreak using geo-located tweet that related with HFMD. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17
  18. 18

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article