Search Results - (( java implementation rsa algorithm ) OR ( pattern visualisation based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…As the quality and complication of data on the internet are increasing in today’s rapidly evolving area, the clustering methods become the indispensable techniques to find the patterns of the data. There are many types of clustering techniques that have been developed included partitioning methods, hierarchical clustering, density-based clustering, model-based clustering, and fuzzy clustering. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7
  8. 8

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…To ensure the functionality of the proposed fabric-based pressure sensor, a colour-coded mesh plot was developed to visualise the sensor data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…Thirdly, to develop an automated spatial prediction model that could potentially predict the UGS changes and their effect on the LST pattern. This research also tested the suitability of object-based classification methods of high-resolution aerial imagery using the support vector machine (SVM) classifier regarding its capability to correctly classify and recognise UGS patterns. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Extracting Object Oriented Software Architecture from C++ Source Code by Mresa, Ali Hussein A.

    Published 2000
    “…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals by Muhammad Ikmal Hakim Shamsul Bahrin, Hazlina Md Yusof, Shahrul Na’im Sidek, Aimi Shazwani Ghazali

    Published 2024
    “…However, their reading strategies were too random and lacked systematic patterns. The system aims to be an instrument for visualising the cognitive process underpinning the exploration and interpretation of tactile graphics by people with visual impairment and blindness.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals by Shamsul Bahrin, Muhammad Ikmal Hakim, Md Yusof, Hazlina, Sidek, Shahrul Na'im, Ghazali, Aimi Shazwani

    Published 2024
    “…However, their reading strategies were too random and lacked systematic patterns. The system aims to be an instrument for visualising the cognitive process underpinning the exploration and interpretation of tactile graphics by people with visual impairment and blindness.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article