Search Results - (( java implementation rsa algorithm ) OR ( using creative process algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Factors and types of error that contributes to the difficulties in solving Mathematical problems among Year 5 pupils in SK Goebilt, Kuching / Hardi Rasidi by Rasidi, Hardi

    Published 2016
    “…The test results and findings are analyzed using descriptive statistics. In this research, pupils were tested using a set of 10 question of mathematical word problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan by Nik Mazlan, Nik Aidil Syawalni

    Published 2024
    “…The methodology adopted in this study encompasses the assembly of a dataset images of Songket patterns. The process included data pre-processing and feature extraction. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron by Che Haron, Mohammad Bakri

    Published 2013
    “…The Natphoric algorithm learns the process done by training with sets of training data from previous KE research works. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    High performance work system-performance nexus in Nigerian SMEs: a moderated mediation study by Ismail, Abdussalaam Iyanda

    Published 2018
    “…The Partial Least Squares Method (PLS) algorithm and the bootstrapping technique were used to test the study's hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS by Ahmed A.L., Hassoon N., Hak L.A.L., Edan M., Abed H., Abd S.

    Published 2023
    “…That means the hybrid (PSO-BA) algorithm has the better results, which means it can be used as one of the best search approaches to extract features from fingerprints � 2022, Authors. …”
    Article
  17. 17
  18. 18

    Reimagining English language learning: a systematic review of AI integration in classroom practice (2019–2024) by Ibrahim Brian, Muhammad Shyazzwan

    Published 2025
    “…These include limited teacher preparedness, ethical concerns such as data privacy and algorithmic bias, and a lack of research into the long-term, scalable use of AI, particularly in under-resourced or marginalized educational contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…This methodology combines value analysis method using Function Analysis System Technique (FAST); Life Cycle Cost analysis, group decision analysis method based on Analytical Hierarchy Process (AHP), and Game theory-based agent system to develop a negotiation support. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications by Bello Tambawal, Abubakar, Noor, Rafidah Md, Salleh, Rosli, Chembe, Christopher, Oche, Michael

    Published 2019
    “…This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.…”
    Get full text
    Get full text
    Article