Search Results - (( developing implementation tree algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary by Mohd Zamary, Nurul Aida

    Published 2024
    “…The phase of this project is divided into data preprocessing, implementation of the decision tree algorithm, and evaluation of the algorithm and prototype. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti by Abd Mokti, Nurnazifah

    Published 2024
    “…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…A Zero Skew clock routing methodology has been developed to help design team speed up their clock tree generation process. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Zero skew clock routing for fast clock tree generation by Reaz, Mamun Ibn, Amin, Nowshad, Ibrahimy, Muhammad Ibn, Mohamad-Yasin, F., Mohammad, A.

    Published 2008
    “…A Zero Skew Clock Routing Methodology has been developed to help design team speed up their clock tree generation process. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah by Abdullah, Suzanah

    Published 2021
    “…At this stage, this study has formulated a new methodology for estimating DTM production under tree canopy conditions based on tree crown estimation produced from the digital surface model (DSM) and subsequently, the tree height estimation was determined as the final process in the DTM implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A comparison of support vector machine and decision tree classifications using satellite data of Langkawi Island by Mohd Shafri, Helmi Zulhaidi, Ramle, F. S. H.

    Published 2009
    “…Two classifiers were used to classify SPOT 5 satellite image; Decision Tree (DT) and Support Vector Machine (SVM). The Decision Tree rules were developed manually based on Normalized Difference Vegetation Index (NDVI) and Brightness Value (BV) variables. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments by Jauwairia Nasir, Fahad Islam, Yasar Ayaz

    Published 2013
    “…The recent development of its variant: RRT* is considered as a major breakthrough as it makes it possible to achieve optimality in paths planning. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…Another quantum algorithm for a minimum weight spanning tree in the graph was also designed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article