Search Results - (( java implementation rsa algorithm ) OR ( programming using semantic algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…This research proposes a Latent Semantic Indexing classifier that integrates information structural and frequency of terms in its weighting scheme.The content terms are identified by extracting words in the source code program. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Classification of machine learning engines using latent semantic indexing by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…With the huge increase of software functionalities, sizes and application domain, the difficulty of categorizing and classifying software for information retrieval and maintenance purposes is on demand.This work includes the use of Latent Semantic Indexing (LSI) in classifying neural network and k-nearest neighborhood source code programs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    ProCAss: An intelligent assessment for computer programming corpus by Zen, Kartinah, Tarmizi, Seleviawati, A.I, Dayang Nurfatimah, Din, Inson, Chua, Sui Soon

    Published 2005
    “…Then, the ability of LSA algorithm in grading computer program corpus will be evaluated.The grading process will not limited on certain programming languages, but on any programming languages.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Word segmentation of output response for sign language devices by Za'bah, Nor Farahidah, Muhammad Nazmi, Ahmad Amierul Asyraf, Azman, Amelia Wong

    Published 2020
    “…The proposed text segmentation method in this work is by using the dynamic programming and back-off algorithm, together with the probability score using word matching with an English language text corpus. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…PROLOG is the most well known, widely used programming language for logic programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Translating medical image to radiological report: Adaptive multilevel multi-attention approach by Gajbhiye, G.O., Nandedkar, A.V., Faye, I.

    Published 2022
    “…The results of language generation metrics for proposed variants were acquired using the COCO-caption evaluation Application Program Interface (API). …”
    Get full text
    Get full text
    Article
  13. 13

    Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology by Mohamad Hafizuddin Mohamed Najid, Zahidah Zulkifli, Roslina Othman, Rohaiza Rokis, Ashraf Ali Salahuddin

    Published 2024
    “…Out of many other social networking sites, Twitter has been identified as one of the most popular microblogging social networking platforms. Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
    Article
  14. 14

    Identifying the ethical issues in Twitter: a knowledge acquisition for ontology by Mohamed Najid, Mohamad Hafizuddin, Zulkifli, Zahidah, Othman, Roslina, Rokis, Rohaiza, Salahuddin, Ashraf Ali,

    Published 2021
    “…Out of many other social networking sites, Twitter has been identified as one of the most popular microblogging social networking platforms. Using a simple algorithm in R programming and 43 keywords based on Ibn Khaldun’s thoughts, 1075 public tweets have been extracted from Twitter as a sample of ethical issues. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item