Search Results - (( java implementation rsa algorithm ) OR ( program extraction utilizing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. The result of this project are expected to be a comparison of the used methods that will give an indication how well evolutionary programming can perform relative to conventional method and how good the results of the data mining process.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The methodology starts with literature comprehension studies on the computation pitfalls and existed augmentation studies of Simplex algorithm. Then, followed by concept development which consists of concept extraction, computation stages classification and algorithms integration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
    Get full text
    Get full text
    Student Project
  12. 12

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Process of model based slicing is utilized to extract the desired lump out of slice diagram. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application by Mat Seman., Norhidayah

    Published 2019
    “…In most cases, the position controllers rarely utilize geometrical drawing such as CAD/CAM trajectory as input reference without extensive programming or trajectory generation algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…Several distinctive feature from each character is extracted using a few feature extraction methods, in which a comparison between three types of feature extraction modules were used. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…In recent years, there is an increase in the number of open source software.Hence, the demand for automatic software classification is also increasing.Latent Semantic Indexing (LSI) is an information retrieval approach that is utilized in classifying source code programs. This research proposes a Latent Semantic Indexing classifier that integrates information structural and frequency of terms in its weighting scheme.The content terms are identified by extracting words in the source code program. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Finite Element Modeling Of Ballistic Penetration into Fabric Armor by Talebi, Hossein

    Published 2006
    “…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  20. 20

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
    Get full text
    Get full text
    Article