Search Results - (( java implementation rsa algorithm ) OR ( knowledge information using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    An Improvement on Extended Kalman Filter for Neural Network Training by Tsan, Ken Yim

    Published 2005
    “…Extracting useful imformation and knowledge from data is a major concern in information science. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Thus, the objective of this paper is to propose a reliable fuzzy clustering algorithm using z-numbers. This model will demonstrate the capability to handle the knowledge of human being and uncertain information in evaluating the wellness of chronic kidney disease (CKD) patients. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Hence involving problem specific information and expert knowledge in designing segmentation algorithms seems to be useful. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the simulation result, by using these sensors information the AUTOWiSARD algorithm can successfully differentiate and classify states without supervision, while the Q-learning algorithm is able to produce and optimized states-actions policy. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…Database or data warehouse is rich with hidden information that can be used to provide intelligent decision using data mining technique. …”
    Get full text
    Get full text
    Research Reports
  17. 17
  18. 18

    Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan by Mohd Ridzuan, Siti Amnah

    Published 2017
    “…Two new decision making models have been developed in this study, the first is the combination of multi-granular linguistic information using fusion algorithm and consistent fuzzy preference relations (CFPR) and the second one is the combination of multi-granular uncertain linguistic information and consistent linguistic fuzzy preference relations (CLFPR) to cater this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimizing the Management of Knowledge Assets using Swarm Intelligence by Yusof, Yuhanis, Baharom, Fauziah, Mohamed, Athraa Jasim

    Published 2018
    “…This study presents the employment of swarm intelligence algorithm, i.e Firefly Algorithm, to automatically cluster text document without the use of k value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item