Search Results - (( exploring affective computing algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An empirical study of double-bridge search move on subset feature selection search of bees algorithm by Al-dawoodi, Aras Ghazi Mohammed, Mahmuddin, Massudi

    Published 2017
    “…The algorithm performs combination of exploitative neighbourhoods and random explorative search. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A framework for design of automated lecture timetabling using memetic algorithm / Zarina Zainul Rashid, Roslan Sadjirin and Norhafizah Hashim by Rashid, Zarina Zainul, Sadjirin, Roslan, Hashim, Norhafizah

    Published 2009
    “…This study describes the framework design of an automated lecture timetabling in educational institutions using soft computing techniques. In this paper, the writerspresent the use of memetic algorithm in the framework design with affective explorative ability to model huge search space. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Novel Metaheuristic Hybrid Spiral-Dynamic Bacteria-Chemotaxis Algorithms for Global Optimisation by Ahmad Nor Kasruddin, Nasir, Tokhi, M. O.

    Published 2015
    “…Bacteria chemotaxis on the other hand, is the most prominent strategy in bacterial foraging algorithm. However, the incorporation of a constant step-size for the bacteria move- ment affects the algorithm performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM by ABDUL HALIM, ABDUL HANIF

    Published 2018
    “…The main disadvantage of metaheuristic algorithm is no guarantee that a global optimum solution due to the stochastic characteristic driven by the mechanism of exploration and exploitation. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Analysis of Microscopic Blood Samples for Detecting Malaria by Saw Hui, Ann

    Published 2013
    “…The conventional method in diagnosing the blood disease is by using manual visual examination of microscopy blood smears. However, a computer-assisted system can be designed to assist in malaria diagnosis by employing image processing, analysis and feature recognition algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14
  15. 15

    Detection of mental disorders based on the analysis of emotion, facial expressions and facial movements in a video stream by Nurzhanova, Aizhan, Mussabek, Miras, Ince, Gokhan, Mustaffa, Mas Rina, Zhumadillayeva, Ainur

    Published 2025
    “…With help of real-time edge computing, our system enables scalable, privacy-preserving mental health monitoring, underscoring the transformative potential of adaptive affective computing and remote diagnostics.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Chaos search in fourire amplitude sensitivity test by Koda, Masato

    Published 2012
    “…This paper explores the characterization of learning functions involved in FAST and derives the underlying dynamical relationships with chaos search, which can provide new learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article