Search Results - (( developing social function algorithm ) OR ( java based encryption algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…This model will demonstrate the capability to handle the knowledge of human being and uncertain information in evaluating the wellness of chronic kidney disease (CKD) patients. This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    User to user topic recommendation model for student social interaction by Ahmad Subhi, Zolkafly

    Published 2025
    “…This predictive analytics model compared single and multi-classifier accuracy in predicting the importance of a topic for an individual. Then, a newly developed algorithm called the Social Recommendation (SAR) algorithm ranked and recommended the best topic for social interaction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam by Affendy Azam, Nursalsabiela

    Published 2020
    “…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…As a result, a new algorithm was developed not only in minimizing the total generation cost but with an addition on minimum total emission and less system losses as the individual objective function in ED. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of Bee Colony Optimization (BCO) in NP-Hard Problems by Kamarudin, Muhammad Sariy Syazwan

    Published 2011
    “…Various Artificial Intelligence systems have been developed based on plenty of researches and studies done on the behaviour of social insects. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
    Get full text
    Get full text
    Article
  17. 17

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…Social media has revolutionized the Web industry. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis