Search Results - (( developing learning context algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…The objective of this research is to develop a tourist mobile application that can be incorporated with machine learning based recommender system. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In order to address the above mentioned challenges, this study is devoted towards the development of a clusterer and a clustering ensemble learning method based on incremental genetic algorithms addressing group unlabeled samples. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  10. 10

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…As per the findings, the RF algorithm attained the maximum accuracy of 77% in the context of PIDD. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Based on the result, we developed a prototype tool called detection on ambiguous SRS written in Malay using machine learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Developing computational thinking competencies through constructivist argumentation learning: a problem-solving perspective by Voon, Xin Pei, Wong, Su Luan, Wong, Lung Hsiang, Md Khambari, Mas Nida, Syed Abdullah, Sharifah Intan Sharina

    Published 2022
    “…To nurture higher order thinking skills and to engage effective problem-solvers, our framework incorporates four Computational Thinking-Argumentation design principles to support instructional innovation in the teaching and learning of science at the secondary school level, viz. 1) developing problem-solving competencies and building capability in solving uncertainties throughout scientific inquiry; 2) developing creative thinking and cooperativity through negotiation and evaluation; 3) developing algorithmic thinking in talking and writing; 4) developing critical thinking in the processes of abstraction and generalization.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…From a dominant writing in Malay world, the usage of Jawi is confined mostly in Islamic religious context nowadays. As an initiative to encourage the learning of Jawi, this research proposed Jawi Character Recognition system using Neural Network and Supervised Learning method. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis