Search Results - (( developing public using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- using algorithm »
- public using »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut
Published 2016“…The aim of this paper is to develop a lecturers' publication score algorithm to assist UiTM Sabah in selecting winners among lecturers in terms of publication contribution. …”
Get full text
Get full text
Article -
4
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The usage will allowthem to access the system that manipulates this algorithm. The scope of the project includes developing an algorithm, the research and analysis of GPS and the use of SMS. …”
Get full text
Get full text
Final Year Project -
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
6
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
Get full text
Get full text
Thesis -
7
Diagnosis and recommender system for diabetes patient using decision tree / Nurul Aida Mohd Zamary
Published 2024“…This project aims to develop a decision-making support model for diabetes diagnosis and treatment recommendation using the decision tree algorithm. …”
Get full text
Get full text
Thesis -
8
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
9
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance of Semi Active Lateral Control (SALC) algorithm for semi active suspension system in multibody co-simulation method / M. M. Abdul Majid ...[et al.]
Published 2018“…The publication presents a controller strategy used in development of Semi Active Lateral Control (SALC) algorithm for passenger vehicle in enhancing transient handling performance using multibody co-simulation approach. …”
Get full text
Get full text
Article -
11
Metadata network visualizer
Published 2009“…The present invention is developed by firstly, developing and using an algorithm to automatically extract publication metadata, secondly, developing and utilizing a more interactive and networked visualizer to display the publication metadata, with more extensive navigational functionalities and finally by providing the option to save the metadata to a database so that search function can be executed. …”
Get full text
Patent -
12
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…Some popular intelligent techniques like Genetic Algorithm, Fuzzy Logic and Artificial Neural Network are often used by reasearcher to perform classifcation problems. …”
Get full text
Get full text
Thesis -
13
Balanced Stochastic Realization Algorithm For Development Of Rainfall Model
Published 2014“…In this research, Balanced Stochastic Realization (BSR) subspace algorithm is used to develop a rainfall model for Malaysia. …”
Get full text
Get full text
Thesis -
14
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
15
-
16
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
17
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
Get full text
Get full text
Get full text
Thesis -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
20
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…OSA. The prediction algorithms developed are based on the OSA datasets collected mainly from the public hospitals in Selangor, Malaysia. …”
Get full text
Get full text
Thesis
