Search Results - (( developing using sem algorithm ) OR ( java application rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Structural Equation Modeling Algorithm and Its Application in Business Analytics by Sorooshian, Shahryar

    Published 2017
    “…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    An Analytical Algorithm for Delphi Method for Consensus Building and Organizational Productivity by Abd Hamid, Zahidy, Noor Azlinna, Azizan, Sorooshian, Shahryar

    Published 2017
    “…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images by Maizul, Elly Nur Myaisara

    Published 2018
    “…In this study, six samples of two-dimensional (2D) SEM images were spatially transformed using the standard resampling process to produce Geo-referenced SEM sample images. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    Influences of Cost Factors Affecting Technical Performance of Local Government Projects in Nigeria: A Partial Least Square-Structural Equation Modeling (PLS-SEM) Approach by Gambo, Nuru, Said, Ilias, Ismail, Radzi

    Published 2016
    “…A Warp partial least square-structural equation modeling (PLS-SEM) software algorithm was used for the analysis of collected data. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…Data were analyzed using Partial Least Squares-Structural Equation Modeling (PLS-SEM) to examine the relationships between variables. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Let’s collaborate’: Malaysian TVET-engineering institution and industry partnership by U. S., Subri, N. E., Sohimi, H. M., Affandi, S. M., Noor, F. A. N, Yunus

    Published 2022
    “…Then, the data were analysed using the PLS-SEM 3.3.9 software via the algorithm, bootstrapping and blindfolding method. …”
    Get full text
    Get full text
    Article
  20. 20

    Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors by Lateef, Saheed Ademola

    Published 2017
    “…Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
    Get full text
    Get full text
    Get full text
    Thesis