Search Results - (( java implementation rsa algorithm ) OR ( learning basic needs algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- needs algorithm »
- learning basic »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers -
7
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…This conceptual teaching and learning algorithm was conducted in five steps namely the induction set; step 1; step 2; step 3; and enrichment and recovery. …”
Get full text
Get full text
Get full text
Article -
8
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…This conceptual teaching and learning algorithm was conducted in five steps namely the induction set; step 1; step 2; step 3; and enrichment and recovery. …”
Get full text
Get full text
Get full text
Article -
9
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
10
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…It is found that the interrelated tasks in the programming process, with its various abstractions, and timing in delivering the feedback, need to be addressed with the equal attention in learning to program. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…They are part of a tech-savvy generation that led to technological progress that is always connected and linked based on their wishes and needs without any hesitation of time and place. They are basically using technology without guidance, but how far they can manage to handle the consequences of the technology usage and the problems that occur is always questionable. …”
Get full text
Get full text
Get full text
Article -
13
-
14
The A-rray: visual animation in learning structured programming / Wan Salfarina Wan Husain ,Siti Hasrinafasya Che Hassan and Wan Norliza Wan Bakar
Published 2018“…The visual animation is considered to be a very promising potential to aid students in learning and understanding the algorithm concept in programming. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Restock management system by using market basket analysis / Nazrin Adnan
Published 2016“…Market Basket Analysis will analyze the frequent itemset that has been brought by customer while apriori algorithm will learn step by step each of the item through the purchases history. …”
Get full text
Get full text
Thesis -
17
Kodepoly: an engaging approach to blended futuristic learning in coding
Published 2024“…This innovative pedagogical tool seeks to address the prevailing challenge of enhancing coding education's accessibility and appeal, particularly in the Malaysian context where the stimulation of interest in STEM disciplines is critically needed. By combining the strategic elements of Monopoly with a curriculum comprised of coding challenges, debugging exercises, and algorithmic puzzles, Kodepoly aims to render the learning process both enjoyable and substantial in content. …”
Get full text
Get full text
Proceeding Paper -
18
An interactive C++ programming courseware (SIFOO) / Mazliana Hasnan … [et al.]
Published 2012Get full text
Get full text
Book Section -
19
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
