Search Results - (( java application rsa algorithm ) OR ( post implementation tree algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery by Aisyah Marliza Muhmad Kamarulzaman, Wan Shafrina Wan Mohd Jaafar, Siti Nor Maizah Saad, Hamdan Omar, Mohd. Rizaludin Mahmud

    Published 2021
    “…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    The comparison of interactive 3D visualization between static and animated approaches for learning binary tree topic / Mohd Zulhisam Yaakub by Yaakub, Mohd Zulhisam

    Published 2016
    “…This shows that both 3D visualization methods implemented in this study can increase the student learning achievements and spatial abilities. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Identifying Cyberspace Users� Tendency in Blog Writing Using Machine Learning Algorithms by AbuSalim, S.W.G., Mostafa, S.A., Mustapha, A., Ibrahim, R., Wahab, M.H.A.

    Published 2023
    “…The algorithms are Decision Tree (c4.5), Linear Regression (LR), and Decision Forest (DF) with a 10-fold cross-validation method for training and testing. …”
    Get full text
    Get full text
    Article
  10. 10

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…In the human gait model, three Machine Learning algorithms were used: Gaussian Process Regression, Support Vector Machine, and Decision Tree. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…It is organized into three phases: preliminary investigation, implementation and analysis, and validation. The descriptive analysis examines purchasing behavior through correlation and regression analyses, while the predictive model uses decision trees (J48, Random Tree, REPTree), rule-based algorithms (JRip, OneR, PART), and clustering (K-Means) to identify patterns and predict trends. …”
    Get full text
    Get full text
    Thesis