Search Results - (( java application rsa algorithm ) OR ( knowledge implementation during algorithm ))
Search alternatives:
- knowledge implementation »
- implementation during »
- java application »
- during algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
7
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…The dynamic threshold of remaining energy was activated when the mobile robot has knowledge of charging station. The improved honeybee inspired algorithm showed that the mobile robot could increase working time efficiency from 37% to 95%. …”
Get full text
Get full text
Thesis -
8
Information retrieval with comparing two matching algorithms: A thesis supervisor system case study / Siti Nurhanis Mohd Shekri
Published 2014“…This subject will improve the skills and knowledge of students during their studies at the university. …”
Get full text
Get full text
Thesis -
9
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…As nowadays, some muslims attend the Friday Prayers just to obey God instruction instead of willingly come to gain new knowledge. This is where the khutbah texts needs to have a certain level of quality and also new knowledge to ensure muslims does not go back home empty-handed. …”
Get full text
Get full text
Thesis -
10
Development of dynamic programming algorithm for maintenance scheduling problem
Published 2020“…Then, the data of the maintenance team from one of the utilities provider company in Malaysia was collected to be implemented in the development of a dynamic programming algorithm. …”
Get full text
Get full text
Thesis -
11
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…In reducing the learning complexity, a genetic algorithm was implemented to optimize the logical rule throughout the learning phase in performing a 2-satisfiability-based reverse analysis method, implemented during the learning phase as this method was compared. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…In this paper, a computational intelligent technique genetic algorithm (GA) is implemented for the optimization of artificial neural network (ANN) architecture. …”
Get full text
Get full text
Conference or Workshop Item -
13
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
14
Implementation of case-based reasoning in help desk system
Published 2019“…Besides of time consuming when solving customers’ problem, the personnel also faced inherently knowledge problem during help desk operation and difficulty in assessing abundant case data without a systematic system. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
16
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Thus, resulting in the efficiency of the novel AR-IoT remote monitoring algorithm. This research contributes to existing knowledge of AR-IoT onto the growing area of research scopes by exploring more usage of AR and IoT for remote manufacturing monitoring.…”
Get full text
Get full text
Thesis -
17
-
18
-
19
BLAZEBREAKER: GAMIFY THE FLAMES
Published 2024“…The report outlines the design and creation of the VR simulation, emphasizing the integration of a maze structure generated randomly using certain algorithm. Users are required to navigate through the maze, simulating the challenges posed by obstructive elements during fire emergencies. …”
Get full text
Get full text
Final Year Project -
20
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis
