Search Results - (( java implementation rsa algorithm ) OR ( usage patterns machine algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm by Delgoshaei, Aidin, Beighizadeh, Razieh, Mohd Arffin, Mohd Khairol Anuar, Leman, Zulkiflle, Ali, Ahad

    Published 2022
    “…The outcomes demonstrate the superiority of the Support Vector Machine algorithm in terms of achieved maximum score and minimum error. …”
    Get full text
    Get full text
    Article
  9. 9

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…More recently, cyber-attacks have also been on the rise and SQL injection attacks are some of major threats to data security. AI and machine learning have come a long way, however their usage in cybersecurity is still somewhat nascent. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing by Rukshanda, Kamran

    Published 2022
    “…In High-performance Computing (HPC) applications, the resource usage pattern varies over time, making it challenging to track resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…As artificial intelligence (AI) is a very wide subject, two specific areas are chosen to illustrate the practical usage of machine learning frame-works. For the first part, intelligence embedded system has been utilised to improve performance and .secondly, tackling the issues in games and gamification technology. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analyzing UiTMCTKKT vehicle utilization and travel pattern using predictive analytics by Syed Mohamad, Sharifah Masyitah

    Published 2025
    “…Two key experiments were conducted using machine learning models. The Experiment 1 focused on classifying vehicle types based on utilization and Experiment 2 involved predicting no of trips per day using classifiers such as Random Forest, Decision Tree, and Support Vector Machine (SVM). …”
    Get full text
    Get full text
    Student Project
  15. 15

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Advancing literary analysis with Python: a comprehensive study of simile detection and classification in the translation of Al-Abrat by Al Zahrawi, Rasha Talal, Syed Abdullah, Syed Nurulakla, Sarirete, Akila, Abdullah, Muhammad Alif Redzuan

    Published 2025
    “…Key findings reveal distinct patterns in simile usage, particularly the prevalence of perceptible-perceptible and cognitive-cognitive categories, emphasizing the role of figurative language in fostering thematic and emotional engagement. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Comparative analysis for topic classification in juz Al-Baqarah by Rahman, Mohamad Izzuddin, Samsudin, Noor Azah, Mustapha, Aida, Abdullahi Oyekunle, Adeleke

    Published 2018
    “…The classification experiment is using the Support Vector Machine to find themes in Juz‟ Baqarah. The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Development of a simulation-based decision support model for high precision component manufacturer by Gan, Sin Yi

    Published 2013
    “…In such configurations, a job may undergo operations only in certain orders of machines and not necessarily at every machine. The complexity is further compounded by the indefinite batch size for each product. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis