Search Results - (( java application rsa algorithm ) OR ( based educational function algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    NLP- based for providing mental health support in mobile application / Muhammad Amirul Roslan by Roslan, Muhammad Amirul

    Published 2025
    “…Future enhancements, such as advanced machine learning algorithms and user interface improvements, are proposed to further enhance functionality. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Exploring c Environment (S/O: 12826) by Abdul Rahman, Syariza, Ku Mahamud, Ku Ruhana, Ramli, Razamin, Benjamin, Aida Mauziah, Omar, Mohd Faizal

    “…Thus, the intelligent approach to this examination timetabling is new within the timetabling research environment. The hybridized algorithm is expected to possess similar characteristics of a robust optimization algorithm as compared to previously complicated optimization algorithms. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat by Yuliant, Sibaroni, Sri Suryani, Prasetiyowati, Iqbal Bahari, Sudrajat

    Published 2020
    “…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Weight Optimization in Recurrent Neural Networks with Hybrid Metaheuristic Cuckoo Search Techniques for Data Classification by Nawi, N.M., Khan, A., Rehman, M.Z., Chiroma, H., Herawan, T.

    Published 2015
    “…This network can be educated with gradient descent back propagation. However, traditional training algorithms have some drawbacks such as slow speed of convergence being not definite to find the global minimum of the error function since gradient descent may get stuck in local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Determining gender differential item functioning for mathematics in coeducational school culture by Shanmugam, S. Kanageswari Suppiah

    Published 2018
    “…By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
    Get full text
    Get full text
    Get full text
    Article