Search Results - (( java implementation rsa algorithm ) OR ( filing implementation learning algorithm ))
Search alternatives:
- implementation learning »
- filing implementation »
- java implementation »
- implementation rsa »
- learning algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
11
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
12
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Get full text
Article -
13
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Article -
14
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
thesis::doctoral thesis -
15
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
16
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…The global trend in the CCRA study shows that implementing machine learning and deep learning techniques is expanding rapidly. …”
Get full text
Get full text
Thesis -
17
-
18
Perceptions and practices of blended learning in foreign language teaching at USIM
Published 2024journal::journal article -
19
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…In the first phase, the ontology element and algorithm techniques should be selected. While in the second phase, the HTML files are uploaded for processing. …”
Get full text
Get full text
Thesis -
20
Classification of cervical cancer using random forest
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item
