Search Results - (( developing organizations tools algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…Thus, assigning highly correlated GO terms of annotated protein sequences to partially annotated or newly discovered protein sequences can be made. The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph
  7. 7

    SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model by Lee, Nung Kion, Wang, Dianhui

    Published 2011
    “…Results: This paper aims to develop a Self-Organizing Map (SOM) based clustering algorithm for extracting binding sites in DNA sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Algorithm for calculation of cephalometric soft tissue facial traits by Azam Rana, Mohammad, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2007
    “…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…Therefore, development of advanced algorithms for resolving this problem will be useful. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10
  11. 11

    A new approach for forecasting OPEC petroleum consumption based on neural network train by using flower pollination algorithm by Haruna, Chiroma, Khan, Abdullah, Abubakar, Adamu, Saudi, Younes, Hamza, Mukhtar Fatihu, Shuiba, Liyana, Gital, Abdulsalam, Herawan, Tutut

    Published 2016
    “…Our proposed method has the potential to be used as an important tool in forecasting OPEC petroleum consumption to be used by OPEC authorities and other global oil-related organizations.This will facilitate proper monitoring and control of OPEC petroleum consumption.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri by Misri, Izzuddinazwan

    Published 2015
    “…This thesis presents an inquiry into the hybrid cross-cultural features of 3 majority races in Malaysia such the Malay, Chinese, and Indian using optimization tools called Genetic Algorithm in order to achieve new design DNA. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Evaluation of the effectiveness of clustering algorithm in retrieving Malay documents / Aminah Mahmood by Mahmood, Aminah

    Published 2004
    “…This has led to an increased interest in developing methods that can help users to effectively navigate, summarize and organize this information with the ultimate goal of helping them to find what they are looking for. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The goal of this study is to apply anti-phishing tools in preventing the network security attack in an organization. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19
  20. 20