Search Results - (( java implementation rsa algorithm ) OR ( learning programming matching algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…These chatbots acquired its intelligence through a hybrid approach that combines pattern-matching technique and machine learning algorithm in order to formulate its responses. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  11. 11

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…It aims to improve the accuracy of authentication in public cloud computing by dealing directly with behavior recognition, confidence range, and finally generated the electronic personal synthesis behavior (EPSB). Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis
  12. 12

    Mapping Computational Thinking Skills Through Digital Games Co-Creation Activity Amongst Malaysian Sub-urban Children Sub-urban Children by Mohd Kamal, Othman, Syazni, Jazlan, Fatin Afiqah, Yamin, Shaziti, Aman, Fitri Suraya, Mohamad, Nurfarahani, Norman Anuar, Abdulrazak Yahya, Saleh, Ahmad Azaini, Abdul Manaf

    Published 2022
    “…Understanding how CT skills can be fostered in learning programming concepts through co-creating digital games is crucial to determine instructional strategies that match the young students’ interests and capacities. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Class attendance management system using face recognition by Abdul Rhman Salim, Omar, Olanrewaju, Rashidah Funke, Balogun, Wasiu Adebayo

    Published 2018
    “…By facing the camera, the camera will capture the image then pass it to the Raspberry Pi which is programmed to handle the face recognition by implementing the Local Binary Patterns algorithm LBPs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.] by Rahiman, Mohd Hezri Fazalul, Ismail, Nurlaila, Taib, Mohd Nasir, Mohd Ali, Nor Azah, Tajuddin, Saiful Nizam

    Published 2014
    “…The work involves of selected agarwood oil from low and high quality, the extraction of chemical compounds using GC-MS and Z-score to identify the significant compounds as input to the network. The ANN programming algorithm was developed and computed automatically via Matlab software version R2010a. …”
    Get full text
    Get full text
    Get full text
    Book Section