Search Results - (( developing implementation tree algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing implementation »
- implementation tree »
- java application »
- application rsa »
- tree algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…The phase of this project is divided into data preprocessing, implementation of the decision tree algorithm, and evaluation of the algorithm and prototype. …”
Get full text
Get full text
Thesis -
6
Improved Boosting Algorithms by Pre-Pruning and Associative Rule Mining on Decision Trees for predicting Obstructive Sleep Apnea
Published 2017“…The improved algorithms were implemented in OSA dataset and UCI online databases for comparisons. …”
Get full text
Get full text
Get full text
Article -
7
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…This research project focuses on developing a laptop price prediction model using the decision tree algorithm based on laptop specifications. …”
Get full text
Get full text
Thesis -
8
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
9
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…A Zero Skew clock routing methodology has been developed to help design team speed up their clock tree generation process. …”
Get full text
Get full text
Get full text
Article -
10
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
11
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
12
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…To achieve these objectives, the methods employed involve data preprocessing and implementing the Decision Tree (DT) algorithm for classification. …”
Get full text
Get full text
Article -
13
Zero skew clock routing for fast clock tree generation
Published 2008“…A Zero Skew Clock Routing Methodology has been developed to help design team speed up their clock tree generation process. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…At this stage, this study has formulated a new methodology for estimating DTM production under tree canopy conditions based on tree crown estimation produced from the digital surface model (DSM) and subsequently, the tree height estimation was determined as the final process in the DTM implementation. …”
Get full text
Get full text
Thesis -
15
A comparison of support vector machine and decision tree classifications using satellite data of Langkawi Island
Published 2009“…Two classifiers were used to classify SPOT 5 satellite image; Decision Tree (DT) and Support Vector Machine (SVM). The Decision Tree rules were developed manually based on Normalized Difference Vegetation Index (NDVI) and Brightness Value (BV) variables. …”
Get full text
Get full text
Get full text
Article -
16
Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image
Published 2024“…The algorithm development can be categorized into local, global, and semi-global methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
18
Adaptive rapidly-exploring-random-tree-star (Rrt*) -Smart: algorithm characteristics and behavior analysis in complex environments
Published 2013“…The recent development of its variant: RRT* is considered as a major breakthrough as it makes it possible to achieve optimality in paths planning. …”
Get full text
Get full text
Get full text
Article -
19
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…Another quantum algorithm for a minimum weight spanning tree in the graph was also designed. …”
Get full text
Get full text
Thesis -
20
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article
