Search Results - (( java application stemming algorithm ) OR ( program implementing private algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Web page application was programmed by Java Enterprise Edition (J2EE). Signatory however use a special Digital Signature Application which store the secret private key. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…By exposing the SDN main controller network with various simulated scenario like a virus attack, a program is written to ensure that the implementation of the attack from an attacker could be put to stop. …”
    text::Final Year Project
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Facilitating English Language teaching through AI- based drama in Palestine by Bsharat, Tahani, Sheikh Ahmad, Ismail

    Published 2025
    “…Artificial Intelligence (AI) has the potential to significantly reshape the landscape of education through the integration of AI- powered tools, personalized learning algorithms, and virtual and augmented reality. In a study exploring the integration of AI- based drama in English language teaching in Palestine, a cohort of 43 teachers from both governmental and private schools participated in a questionnaire- based assessment. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…ECC encrypts and transfers the private keys as AES private keys in the proposed scheme, while AES encrypts the plain text (communication data). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Dynamic investment model for the restructed power market in the presence of wind source by Esfahani, Mohammad Tolou Askari Sedehi

    Published 2014
    “…In the third step, the long term optimal investment strategies of the hybrid wind-thermal investor are determined based on the dynamic programming algorithm by considering the long term states of demand growth and fuel price uncertainties. …”
    Get full text
    Get full text
    Thesis