Search Results - (( java application rsa algorithm ) OR ( problem implication from algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. …”
    Get full text
    Get full text
    Book Section
  7. 7
  8. 8

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…On the other hand, FWZIC effectively computes the important weight of the criteria with zero inconsistency. The implications of this study bring benefits to the optimization community, industrial and researchers by providing exhaustive evaluation methodology for evaluating MaOO algorithms, which can be generalized to solve such problem effectively.…”
    Get full text
    Get full text
    Thesis
  9. 9

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Therefore, a new space-time fuzzy implication operator is introduced, by modifying the existing implication operators to accommodate time as an added dimension. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Assessment of using EZ-Prog: an easy color schematic model for programming problem solving by Siti Nordianah Hai Hom, Hasnul Hadi Ibrahim, Abrizah Ibrahim, Mudiana Mokhsin, Corrienna Abdul Talib

    Published 2020
    “…The implications of this study indicate that EZ-Prog can be used in learning and teaching algorithms, especially programming problems. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…Integrating a trajectory correction algorithm in the navigation control can overcome this problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Investigating the cognitive processes in solving management science problems by Cheng, Sheila, Siow, Heng Loke

    Published 2010
    “…Results of the study reveal that performance of well-structured problems is independent from the ill-structured problems. …”
    Get full text
    Get full text
    Journal
  14. 14
  15. 15

    Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli by Zulkifli, Nik Zurifa Nabilah

    Published 2022
    “…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Why coding? Why now? From coding to computational thinking through computational mathematics problem based learning (CM-PBL) by Ku, Soh Ting, Talib, Othman, Md. Yunus, Aida Suraya, Zolkepli, Maslina

    Published 2019
    “…Computational thinking is one of the conceptual foundations which required combination of data and ideas to solve problems effectively and efficiently. Computational thinking is essential to computing and information science (i.e., algorithmically, with or without the assistance of computers) to solve problems with solutions that are reusable in different contexts. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Temporal - spatial recognizer for multi-label data by Mousa, Aseel

    Published 2018
    “…The first improvement is realized as TS-Layer Neocognitron algorithm which solves the shift in position problem in feature extraction phase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article
  19. 19

    Profiling reviewers’ social network strength and predicting the “Helpfulness” of online customer review by Bilal, M., Marjani, M., Hashem, I.A.T., Malik, N., Lali, M.I.U., Abdullah Gani

    Published 2021
    “…Furthermore, the performance of Machine Learning (ML) algorithms and the importance of features are separately examined for both problems using different time span of reviews. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Artificial intelligence (AI) and its application in architecture design: a thematic review by Jin, Deran, Zairul, Mohd, Salih, Sarah Abdulkareem

    Published 2025
    “…Data for this research encompassed a thematic review of 54 publications spanning from 2019 to 2023. The use of ATLAS. ti 23 aided in documenting and indicating the research directions pursued by scholars. …”
    Get full text
    Get full text
    Get full text
    Article