Search Results - (( java implementation rsa algorithm ) OR ( process application customization algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. The application evaluation process is carried out by the developer's functionality test to ensure that there are no unnecessary issues in this app, especially in the main feature. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Sentiment analysis of customer review for Tina Arena Beauty by Amri, Nur Najwa Shahirah

    Published 2025
    “…Customer review data were collected from multiple platforms and processed using Natural Language Processing (NLP) techniques such as Term Frequency-Inverse Document Frequency (TF-IDF). …”
    Get full text
    Get full text
    Student Project
  9. 9

    An Email to Readable Vietnamese Text Conversion Algorithm for Use in TTS Application by Tran, D.C., Son Ha, H., Quach, L.-D., Hassan, M.F.

    Published 2020
    “…However, it's text-to-speech (TTS), an essential part of the complete engine, is currently having difficulties in reading customer emails. Therefore, this work presents an email to readable Vietnamese text conversion algorithm for use in TTS application. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch by Muhammad, Ichsan, Tri Basuki, Kurniawan

    Published 2023
    “…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning by Lim, Wai Ping, Goh, Ching Pang

    Published 2023
    “…Using a dataset from Kaggle comprising 13 attributes and 5000 rows of bank customer data, the research addresses the challenge of processing overwhelming customer information by leveraging machine learning models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20