Search Results - (( developing prevention program algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing prevention »
- java application »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. …”
Get full text
Get full text
Get full text
Article -
7
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is also found that using appropriate preventive maintenance program can cause up to 75% reduction in cell-load variation. …”
Get full text
Get full text
Thesis -
8
Implementation of Dijkstra Algorithm with React Native to Determine Covid-19 Distribution
Published 2022“…This research implements Dijkstra's Algorithm written in the React Native programming language to build a Covid-19 tracking application. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
12
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
13
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
Get full text
Get full text
Thesis -
14
Development of a sensor device algorithm and monitoring system for the pin-on-disc (POD) tribometer
Published 2024text::Final Year Project -
15
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
17
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. …”
Get full text
Get full text
Thesis -
18
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
19
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Nevertheless, the optimization task requires specific care in order to prevent the issue of overfitting classification model. …”
Get full text
Get full text
Get full text
Thesis -
20
