Search Results - (( java implementation rsa algorithm ) OR ( programming practices training algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Analysis Of Human Detection Method In Social Distancing Monitoring by Nur Aina Syafinaz, Muhamad Atfan

    Published 2022
    “…Google Colaboratory is used as a programming platform with the use of Python programming language. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Train Track Misalignment Detection System by Kang , Chun Hong

    Published 2014
    “…Practical implementation had also being conducted on both car and passenger-loaded train. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Kernel methods and support vector machines for handwriting recognition by Ahmad A.R., Khalid M., Yusof R.

    Published 2023
    “…Finding the solution hyperplane involves using quadratic programming which is computationally intensive. Algorithms for practical implementation such as sequential minimization optimization (SMO) and its improvements are discussed. …”
    Conference paper
  10. 10

    Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin by Husin, Hapida

    Published 2008
    “…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals by Ismail, Abdussalaam Iyanda, Abdul Majid, Abdul Halim, Zakaria, Mohd Normani, Abdullah, Nor Azimah Chew, Hamzah, Sulaiman, Mukari, Siti Zamratol-Mai Sarah

    Published 2018
    “…However, screening technique has zero effect on health practitioners' awareness, indicating the reason why T-statistics is not significant.Conclusion: Having started the UNHS program in 2003, non-public hospitals have more experienced and well-trained employees dealing with the screening tools and instrument, and the program layout is well structured in the hospitals. …”
    Get full text
    Get full text
    Article
  12. 12

    A protocol for developing a classification system of mosquitoes using transfer learning by Pradeep Isawasan, Zetty Ilham Abdullah, Ong, Song Quan, Khairulliza Ahmad Salleh

    Published 2022
    “…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fish disease detection using Convolutional Neural Network (CNN) / Nur Adriana Qaisara Azahar by Azahar, Nur Adriana Qaisara

    Published 2024
    “…By being trained on several datasets, the model can identify important features from images of fish. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Developing Android Application To Guide Lean Six Sigma PDCA Project by Ong, Sin Joo

    Published 2018
    “…The knowledge of Lean Six Sigma can be learned through online training, university course and company training program. …”
    Get full text
    Get full text
    Monograph
  15. 15

    A concept paper on readiness in artificial intelligence (AI) mastery and its impact on 21st century pedagogy among pre-service history teachers by Arzizul Bin Antin, Dg Norizah binti Ag Kiflee Dzulkifli

    Published 2025
    “…Key barriers include insufficient training, limited access to digital infrastructure, and lack of institutional support, alongside concerns about data privacy and algorithmic bias. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The main objective of this research is the novel application of Partial least square path analysis (PLS-PA) to explore the latent sub-constructs of knowledge, attitude, and practices (KAP) on dengue via R programming language. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A Multi-Criteria Decision-Making Approach for Targeted Distribution of Smart Indonesia Card (KIP) Scholarships by Komang, Aryasa

    Published 2025
    “…Meanwhile, in the classification stage, the C5.0 algorithm achieved the highest accuracy of 97.27% from a total of 551 data points, with 80% used as training data and 20% as testing data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The ability to combine practical applications and visualization is among the advantages of technology based training and teaching. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Exploring the ethical dimensions of artificial intelligence and robotics in dental education by Sim, Galvin Siang Lin, Foo, Jia Yee, Goh, Shu Meng, Alam, Mohammad Khursheed

    Published 2024
    “…Professional development programs should prioritize ethics training, considering emerging technologies such as AI-powered learning and diagnostic assistance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article