Search Results - (( developing web implementation algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. This is where k-luster comes in. k-luster, the web application developed as a result of this project, implements the K-means and K-means++ algorithm along with ten proximity measures, seven of which are distance measures and whereas the remaining three are similarity measures. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…In this project, a web application and a web service were proposed and implemented. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  15. 15

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi by Ramzi, Nurul Syazwani

    Published 2017
    “…By using this algorithm, the web page is segmented into several big blocks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    XML web services / Wong Kok Chuan by Wong, Kok Chuan

    Published 2003
    “…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad by Sulaiman, Muhammad Nur Haqeem, Ahmad, Norhasliza

    Published 2023
    “…The development of this web application has the potential to revolutionize the way students search and apply for scholarships. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…The constant advancement of web development trends and technology has resulted in a big number of web systems that are frequently visited on a regular basis. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…Moreover, the total time taken for food preparations is longer. Therefore, the web based system is developed using priority scheduling algorithm to reduce the time taken in ordering process, handling and preparing bulk and concurrent order, and at the same time minimizing the cost of handling staffs. …”
    Get full text
    Get full text
    Conference or Workshop Item