Search Results - (( java implementation rsa algorithm ) OR ( process implication new algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A new fuzzy peer assessment methodology for cooperative learning of students by Tay, Kai Meng, Kok, Chin Chai, Chee, Peng Lim

    Published 2015
    “…In this paper, a new fuzzy peer assessment methodology that considers vagueness and imprecision of words used throughout the evaluation process in a cooperative learning environment is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection by Basheer G.S., Ahmad M.S., Tang A.Y.C.

    Published 2023
    “…We propose a new dimension to detect learning styles, which involves the individuals of learners' social surrounding such as friends, parents, and teachers in developing a novel agent-based framework. …”
    Conference Paper
  9. 9

    A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies by Ahmad, Kamsuriah

    Published 2008
    “…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A New Hybrid Embedding Method in Iris Biometric System by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad, Jusoff, Kamaruzaman, Ahmad, Rabiah, Ayop, Zakiah, Anawar, Syarulnaziah, Shaaban, Azizah, Yusoff, Mariana

    Published 2013
    “…The system is developed using both eyes and each eye is enrolled with 10 snaps. The embedding process creates the embedded iris feature and the reverse process of embedding is known as de-embedding. …”
    Get full text
    Get full text
    Article
  11. 11

    The impact of new technologies (AI, Blockchain & Big Data) in the accounting profession by Hasan, Zulkifli, Che Hassan, Nor Asmawani

    Published 2025
    “…One of the major issues resulting from the adoption of new technology is job displacement. The need for traditional accounting-related employment will decline as AI systems become increasingly capable of handling more mundane activities like data entry, transaction processing, and even simple audits. …”
    Get full text
    Get full text
    Article
  12. 12

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…All evaluation studies for MaOO algorithms have ignored to assign such weight for the target criteria during evaluation process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new hybrid embedding method in iris biometric system by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad, Jusoff, Kamaruzaman, Ahmad, Rabiah, Ayop, Zakiah, Anawar, Syarulnaziah, Shaaban, Azizah, Yusoff, Mariana

    Published 2013
    “…The system is developed using both eyes and each eye is enrolled with 10 snaps. The embedding process creates the embedded iris feature and the reverse process of embedding is known as de-embedding. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Organizational Culture Automated Audit System (OCAAS) by Al - Jubair, Md. Abdullah

    Published 2017
    “…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…Overall, this thesis presents five contributions: the proposed modified word vectors algorithm, the new contextual classification dataset named QCoC, the efficient question-type classifier based on the feed-forward neural network algorithm, the potential transferability of the presented work to other domains, and the practical implications of the presented work towards cases where computational resources are limited or costly.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…Experimental results demonstrate that SWOR decreases execution time by an average of 27% across various tests, outperforming existing approaches in terms of processing time for RFID event streams. The materials and methods employed include comprehensive simulations and real-world RFID data streams to validate the algorithm's effectiveness. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Selective exposure in the digital age: a systematic review of the mechanisms, contexts, and sociopsychology implications for media ecosystems(2013-2023) by Chi, Jinglin, Kamarudin, Syafila

    Published 2025
    “…This study shows the relevance of selective exposure research for the understanding of media behaviors, cognitive processes, and sociopolitical dynamics for future research as well its implications as sensitive to media literacy programs and policy interventions. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Characterization of Pattern for Predicting Ultra Violet (UV) Effects in Environment Data Management System (EDMS) by M. Amir Abas, M. Dahlui, UniKL BMI

    Published 2013
    “…This system is capable of measuring, processing and analyzing the environment data. Data will be processed through analysis tools, utilizing the statistics pattern recognition technique. …”
  20. 20

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
    Get full text
    Get full text
    Article