Search Results - (( developing information modelling algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing information »
- modelling algorithm »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of Algorithm for QoS Model in Cloud Computing
Published 2021Get full text
Get full text
Get full text
Article -
7
-
8
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…We improved the ID3 decision tree algorithm such that it can be utilized on spatial data in order to develop a classification model for hotspots occurrence. …”
Get full text
Get full text
Get full text
Article -
9
Agent-based extraction algorithm for computational problem solving
Published 2015“…Moreover, the extraction algorithm is located in User_Agent to perform extraction of appropriate information needed from the text and later send this information to PAC_Agent for analysis modeling and displaying input, process and output. …”
Get full text
Get full text
Thesis -
10
-
11
Development of doppler shift algorithm for modelling sea surface current movements from radar remote sensing data
Published 2008“…The maximum sea surface current of 0.7 m/s is observed onshore over water depth of 10 m. The regression model indicated that Doppler spectra model is appropriate algorithm to compute the quantity information of sea surface current.…”
Get full text
Monograph -
12
Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document
Published 2006“…This thesis concerns a Malay-English monolingual and cross-language information retrieval system. It presents a pioneer work in the aspects that are important for the development of Malay-English information retrieval system. …”
Get full text
Get full text
Thesis -
13
The compact genetic algorithm for likelihood estimator of first order moving average model
Published 2012“…One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An Algorithmic Approach for Stability of an Autonomous System
Published 2002“…It is hoped that the software developed will be of help to researchers in the field of mathematical biology to understand the concept of stability in their model.…”
Get full text
Get full text
Thesis -
15
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study also shows that Ant Colony Optimization is a suitable technique in developing the classification model. Besides, the Ant-Miner algorithm is suitable in this study because it can train the data for many times to obtain the highest percentage of accuracy for developing the classification model to predict the attackers of online shaming. …”
Get full text
Get full text
Thesis -
16
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
Get full text
Get full text
Undergraduates Project Papers
