Search Results - (( developing organizations modified algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid of differential search algorithm and flux balance analysis to: Identify knockout strategies for in silico optimization of metabolites production by Daud K.M., Zalmiyah Zakaria, Zuraini Ali Shah, Mohd Saberi Mohamad, Safaai Deris, Omatu S., Juan Manuel Corchado Rodríguez

    Published 2018
    “…Hence, many computational algorithms have been developed. Nevertheless, most of these algorithms are hindered by the solution being trapped in the local optima. …”
    Get full text
    Get full text
    Indexed Article
  8. 8

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…The analysis utilized a novel modified stacked Multiple Linear Regression- -Support Vector Regression (MLR- -SVR) algorithm, and a novel modified stacked MLR- -Support Vector Regression (MLR- -SVR) algorithm, demonstrating high predictive capability, especially in a limited dataset environment, which the algorithms’ superiority ranked utilizing modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (Taguchi-based VIKOR) multi-criteria decision-making algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Advances in fatigue life modeling: A review by Kamal, Minhas, M. M., Rahman

    Published 2018
    “…Various techniques to estimate fatigue life have been identified, such as critical plane deviation, 5D deviatoric space enclosed surface, modified Wholer curve. However, the most notable one to be found is the application of evolutionary optimization algorithms for, e.g., genetic algorithms, artificial neural networking, and differential ant-stigmergy algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Search engine optimization techniques for Malaysian university websites a comparative analysis on Google and Bing search engine by Shahzad, Asim, Mohd Nawi, Nazri, Sutoyo, Edi, Naeem, Muhammad, Ullah, Arif, Naqeeb, Sundas, Aamir, Muhammad

    Published 2018
    “…As Google modify its algorithm about 500 or more times per year, the web design and internet also evolves dynamically because of changes in SEO techniques and algorithms. …”
    Get full text
    Get full text
    Article
  15. 15

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…This study only focuses on three types of clustering techniques which are k-means clustering, agglomerative hierarchical clustering with the ward’s linkage, complete linkage, and average linkage, and Self-Organizing Map (SOM). The clustering algorithms are written using Python language by modifying the coding obtained from the Internet. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    A krill herd behaviour inspired load balancing of tasks in cloud computing by Hasan, Raed Abdulkareem, Mohammed, Muamer N.

    Published 2017
    “…A developing trend in the IT environment is mobile cloud computing (MCC) with colossal infrastructural and resource requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination by Haspi Harun, Hanif

    Published 2021
    “…Different levels of IR algorithms were applied in routine CTPA and several modified tube potentials. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.] by Abu Samah, Khyrina Airin Fariza, Wirakarnain, Nurqueen Sayang Dinnie, Deraman, Noor Afni, Johari, Siti Nor Amalina, Moketar, Nor Aıza, Hasrol Jono, Mohd Nor Hajar

    Published 2021
    “…The extracted Jobstreet’s data runs the pre-processing, develops the model, and runs on real-world data. Linear Regression algorithm was used to predict the salary and tested using mean absolute error to validate the prediction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis