Search Results - (( developing online implication algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- implication algorithm »
- java implementation »
- online implication »
- implementation rsa »
- developing online »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach
Published 2019“…Research limitations/implications – Future research can be done considering both online and conventional marketing communications for the same purpose. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…We discuss both agent and multi-agent systems and focus on the implications of the theory of detecting learning styles that constitutes behaviors of learners when using online learning systems, learner's profile, and the structure of multi-agent learning systems. …”
Conference Paper -
8
Innovating communication adaptation on social media using AI-based decision support systems
Published 2025“…The study contributes practical implications for developers and practitioners aiming to design intelligent platforms that empower social media users with innovative tools for communication adaptation, ultimately driving more effective and engaging digital experiences…”
Get full text
Get full text
Get full text
Article -
9
Capabilities and competencies related to leadership performance effectiveness in the context of change in Malaysian Higher Education Institutions / Majid Ghasemy
Published 2017“…For this purpose, the online version of the survey was administered among academic leaders in 25 public and private universities. …”
Get full text
Get full text
Get full text
Thesis -
10
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…The main objective of this project is to develop a drowsiness detection and alert system using a Raspberry Pi. …”
Get full text
Get full text
Book Section -
11
Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli
Published 2023“…The main objective of this project is to develop a drowsiness detection and alert system using a Raspberry Pi. …”
Get full text
Get full text
Book Section -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Measuring the effects of strategic capability, entrepreneurial orientation, servant leadership, and assistive technology on success of visually impaired leaders
Published 2021“…A theoretical framework was developed based on existing literature. The data was collected through an online survey by sending a link of questionnaires via WhatsApp to all visually impaired leaders in Malaysia. …”
Get full text
Get full text
Get full text
Thesis -
14
A conceptual anonymity model to ensure privacy for sensitive network data
Published 2021“…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
