Search Results - (( java implementation rsa algorithm ) OR ( usage patterns learning algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…It is believed that the fastest way to learn is by retrieving previously recorded framework usage experiences or cases. …”
    Conference paper
  11. 11

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…To improve the recognition of the character, the system uses neural network training algorithm called Supervised Learning to receive new character pattern in order to strengthen the weight of the pixels. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of intelligent hybrid learning system using clustering and knowledge-based neural networks for economic forecasting : First phase by Che Mat @ Mohd Shukor, Zamzarina, Md Sap, Mohd Noor

    Published 2004
    “…We proposed KMeans clustering algorithm that is based on multidimensional scaling, joined with neural knowledge based technique algorithm for supporting the learning module to generate interesting clusters that will generate interesting rules for extracting knowledge from stock exchange databases efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…CT refers to the capacity of learners to systematically tackle unstructured tasks focused on four computing concepts such as decomposition, abstraction, pattern recognition, and algorithmic thinking. The purpose of this paper is to study the relationship between CT and Mayer’s Cognitive Theory of Multimedia Learning (CTML) on the cognitive load of the learners. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics by Syed Mohamad, Sharifah Masyitah

    Published 2025
    “…The primary objective of this project is to identify vehicle usage trends, monitor driver workload, and predict day types associated with peak or low demand periods. …”
    Get full text
    Get full text
    Student Project
  19. 19

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat by Al Zahrawi, Rasha Talal, Syed Abdullah, Syed Nurulakla, Sarirete, Akila, Abdullah, Muhammad Alif Redzuan

    Published 2025
    “…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
    Get full text
    Get full text
    Get full text
    Article