Search Results - (( java implementation rsa algorithm ) OR ( program interactive means algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The impact of virtual reality on programming algorithm courses on student learning outcomes by Dewi, Ika Parma, Ambiyar, Effendi, Hansi, Giatman, Muhammad, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…This study aims to determine the impact of VR compared to traditional learning in improving student learning outcomes on programming algorithm materials. The method applied was a quasi-experimental design through pretest and posttest. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq by Zebel , Al Tareq

    Published 2021
    “…Different teaching approaches for programming are widespread but what is essential for students is being able to computationally formulate an algorithmic solution at first and then transfer to code. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Computer control of batch process plant (software development) by Safian, Salehudin

    Published 1995
    “…This thesis reports on the development of the control tools by means of programming using the Turbo Pascal 6.0 and MATLAB Student Edition software. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Data-Glove-Based Hand Gesture Recognition System Using Flex Sensors And An Imu Sensor by Ong, Jing Hao

    Published 2017
    “…The proposed system was tested in recognizing 38 static and 12 dynamic hand gestures. The meaning of the hand gesture is displayed on GUI created in Raspberry Pi by using Python’s Tkinter programming. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Learning analytic framework for students’ academic performance and critical learning pathways by Lyn, Jessica Tan Yen, Goh, Yong Kheng, Lai, An Chow, Ngeow, Yoke Meng

    Published 2024
    “…The resulting reduced dataset is then subjected to various clustering algorithms, including partition-based clustering (K-means), hierarchical clustering, and density-based clustering (DBSCAN). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Customer sentiment analysis through social media feedback: A case study on telecommunication company by Mat Zain, Siti Nur Syamimi, Ramli, Nor Azuana, Adnan, Rose Adzreen

    Published 2022
    “…Lasty, the performance of each model was compared to select the most accurate model and from the analysis, it can be concluded that Support Vector Machine gives the best performance in terms of accuracy, Mean Squared Error, Root Mean Squared Error and Area Under the ROC curve.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Customer sentiment analysis through social media feedback by Siti Nur Syamimi, Mat Zain

    Published 2022
    “…Lasty, the performance of each model was compared to select the most accurate model and from the analysis, it can be concluded that Support Vector Machine gives the best performance in terms of accuracy, mean squared error, root mean squared error and area under ROC curve. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Ump Intelligent Chatbot Using Dialogflow by Joachim, Agostain

    Published 2022
    “…A chatbot is an automated program that interacts with customers like a human would and cost little to nothing to engage with. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    4E analysis of a two-stage refrigeration system through surrogate models based on response surface methods and hybrid grey wolf optimizer by Ahmed, R., Mahadzir, S., Mota-Babiloni, A., Al-Amin, M., Usmani, A.Y., Ashraf Rana, Z., Yassin, H., Shaik, S., Hussain, F.

    Published 2023
    “…Firstly, the interaction between the system components and their cycle behavior is analyzed by building four surrogate models using RSM. …”
    Get full text
    Get full text
    Article