Search Results - (( java application rsa algorithm ) OR ( data classification protocol algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Presently, the classification accuracy of the assessment is proportional to the size of the data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…Thus the proposed algorithm prolongs the network under consideration by 57 – 62% as compared to networks with conventional routing protocols.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Classification model for predictive maintenance of small steam sterilisers by Musabayli, Musagil, Osman, Mohd Hafeez, Dirix, Michael

    Published 2020
    “…The classification models were built from multisensory data, obtained from 1000 protocol records of CertoClav Vacuum Pro steam sterilisers. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…They often communicate using appropriate protocols such as MQTT, CoAP, or HTTP to ensure the smooth transmission of data used by a variety of smart home services. …”
    Get full text
    Get full text
    Article
  15. 15

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Automated feature extraction on brain MRI images for predicting multiple sclerosis patient disability by M. Muslim, Ali

    Published 2022
    “…The first phase aims to investigate the best types of required data, features and algorithms to be used in the final proposed methodology to predict exact EDSS, and different ranges of EDSS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems by Mubarak, Sinil, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana, Khan, Sheroz, Islam, Md Rafiqul

    Published 2019
    “…It supervises physical process by collecting data from sensors and performs monitoring, data logging, alarm and diagnostic functions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    EEG-based emergency calling system for neurological disorder patient by Halim, Che Mat Nasir, Norizam, Sulaiman, Mahfuzah, Mustafa, Hasan, Md Mahmudul, Mohd Shawal, Jadin, Mohd Zamri, Ibrahim

    Published 2025
    “…The MATLAB Graphical User Interface (GUI) algorithm is constructed to display the EEG data analysis and health status of the Neurological disorder patients. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Prediction of sleep pattern for university students using machine learning by Widya, Muhammad Faishal Atha, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2026
    “…The Random Forest algorithm was employed for classification, evaluated using a 5-Fold Cross-Validation protocol, and achieved an average accuracy of 81.46%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Classification of acute leukemia using image processing and machine learning techniques / Hayan Tareq Abdul Wahhab by Wahhab, Hayan Tareq Abdul

    Published 2015
    “…The methodology presented in this research consisted of several stages namely, image acquisition, image segmentation, feature extraction/selection and, classification. The data was collected from two different sources, University of Malaya Medical Center (UMMC), Malaysia and M. …”
    Get full text
    Get full text
    Thesis