Search Results - (( java application rsa algorithm ) OR ( post implementation models algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The algorithms have been implemented using Matlab software version 6.5. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…The online wavelet filter is further implemented to filter out the noise in the LFC model. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network by Salari, Nader, Shohaimi, Shamarina, Najafi, Farid, Nallappan, Meenakshii, Karishnarajah, Isthrinayagy

    Published 2014
    “…In the present study, the results of the implementation of a novel hybrid feature selection-classification model using the above mentioned methods are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…The improvement of the model was implemented by incorporating different sliding windows on the model's input parameters. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm by Muhammad Arif, Abdullah

    Published 2019
    “…Furthermore, a case study was conducted to validate the proposed EE-ASP model and the performance of the optimisation algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    JOINT TORQUEESTIMATION OF sEMG SIGNALS BASED ON INTELLIGENT TECHNIQUES FOR ROBOTIC ASSISTIVE SYSTEM by KU ABD RAHIM, KU NURHANIM

    Published 2014
    “…This research focuses on implementation of intelligent algorithms to convert the sEMG signals tojoint torque for task movement ofelbow flexion and knee extension for robotic assistive system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Multi-modal association learning using spike-timing dependent plasticity (STDP) by Ibrahim, Mohammed Fadhil

    Published 2014
    “…The experiments show that the PCA-based Eigenfaces feature extraction approach produces better results than SVD. We implement the proposed learning model by using the Spike- Timing-Dependent Plasticity (STDP) algorithm, which depends on the time and rate of pre-post synaptic spikes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The high prediction accuracy rate and the close-to-unity area under curve (AUC) value of ROC curve of the discovered relay decision algorithm (prediction rules) from the Rough-Set-Theory-and-Genetic-Algorithm data mining verified the algorithm’s generalized ability to predict as well as discriminate future unknown-trip-status relay events. …”
    Get full text
    Get full text
    Thesis
  20. 20

    The Use of Transmission Line Modelling to Test the Effectiveness of I-kaz as Autonomous Selection of Intrinsic Mode Function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, Remli, M. A. Pi, Karollah, B., Rusman, .

    Published 2017
    “…This paper proposed the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-kaz) to kurtosis ratio (I-kaz-Kurtosis) for that allows automatic selection of intrinsic mode function (IMF) that's should be used. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item