Search Results - (( java implementation rsa algorithm ) OR ( construct validity study algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- construct validity »
- validity study »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
7
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
8
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
9
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
10
Strategies for effective value management practice in construction industry
Published 2017“…The investigated VM methods involved conducting building value analysis in the design stage. To demonstrate the validity and efficiency of the proposed optimisation algorithm, various case studies were conducted in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
12
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…The study demonstrates the reliability and effectiveness of the proposed IDBO algorithm in conjunction with FEA, providing a versatile framework for engineering optimization.…”
Get full text
Get full text
Get full text
Article -
13
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
14
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…As such, the relationship between Stages and Processes of Change in this study is less distinctive, making the generalisability of this construct less convincing. …”
Get full text
Get full text
Get full text
Thesis -
15
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
16
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. …”
Get full text
Get full text
Thesis -
19
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
Get full text
Get full text
Get full text
Thesis
