Search Results - (( java implementation 5s algorithm ) OR ( framework implementation rsa algorithm ))
Search alternatives:
- framework implementation »
- java implementation »
- implementation rsa »
- implementation 5s »
- rsa algorithm »
- 5s algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
4
-
5
-
6
-
7
-
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
-
10
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
12
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
15
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
19
-
20
