Search Results - (( java application rsa algorithm ) OR ( knowledge implementation matching algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Selection of prospective workers using profile matching algorithm on crowdsourcing platform by Cucus, Ahmad, Aji, Luhur Bayu, Al Fahim, Mubarak Ali, Aminuddin, Afrig, Farida, Lilis Dwi

    Published 2022
    “…These criteria become variables that are used in the profile matching algorithm to find workers who best match the profiles offered. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Combining Recursive Least Square and Principal Component Analysis for Assisted History Matching by Md. Anuar, Nurul Syaza

    Published 2014
    “…The algorithm formulated also can easily be practiced, provided with ample knowledge of numerical computational tool to implement it. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Implementation of case-based reasoning in help desk system by Tee, Shih Min

    Published 2019
    “…The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. To achieve this aim, CBR algorithm will be studied and implemented in the help desk system to assist the travel agent provide recommendation to customers on selecting the hotel to stay based on customers’ requirements. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…The Filtering framework provides foundation in developing the algorithm for searching tools. This algorithm can be implemented in both website and search engine.…”
    Get full text
    Get full text
    Research Reports
  12. 12
  13. 13

    Oral Dictionary by Md. Radzi, Ashylla

    Published 2006
    “…Since the output speed is critical, binary search tree algorithm is chosen as best data structure to be implemented in this application to improve the searching time performance. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing by Mohd Sharef, Nurfadhlina

    Published 2006
    “…The scenario of distributed knowledge in organization, lack of understanding of knowledge sharing benefits and technology inadequacies are the main barriers to knowledge sharing facilitation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING by ALI, NOORAZLIN

    Published 2006
    “…To classify a person's mood, a similarity matching procedure will be performed from the input image whereby the input will be matched with the set of criteriathat has been classified in the program. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Development of an automated multidirectional pest sampling detection system using motorized sticky traps by Hadi, Mustafa Kareem, Mohd Kassim, Muhamad Saufi, Wayayok, Aimrun

    Published 2021
    “…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…The thesis presents the design, necessary data structures, algorithms and implementation details of JLOG. The results of comparing the performance of JLOG to regular PROLOG and Tabled PROLOG systems are also presented.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. A complete simulation model of an induction motor and IRFOC scheme is presented and tested using SIMULINWMATLAB, and experimentally implemented on a DSP Board (MCK243j without any need for voltage phase sensors. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Computed tomography and echocardiography image fusion technique for cardiac images by Kalahroodi, Samaneh Mazaheri

    Published 2016
    “…Also, different performance metrics are implemented to examine the performance of the proposed fusion system. …”
    Get full text
    Get full text
    Get full text
    Thesis